 It looks like we've got just about everybody here, and it's time to start. Let me welcome you back to the closing plenary session of the spring 2016 member meeting. I hope that you have had a successful day and a half here. You found some interesting sessions, learned a few things. I have to say I've seen a couple of sessions that really have given me a lot to think about and left me feeling really kind of reinvigorated about a couple of things. So I hope you share some of that feeling. And I also hope you got a chance to at least briefly enjoy some of the nice weather here and maybe take a minute to watch the water go by. I just have a couple of things I want to deal with administratively before we get to the matters at hand. First off, I want to draw your attention to a piece of paper that was in your folder when you registered that has a heading of future meetings. We will be meeting in the fall at the Capitol Hilton in Washington, D.C., December 12th and 13th, and I hope to see many of you there. Next spring on April 3rd and 4th, we will be in Albuquerque, New Mexico, which will be a new venue for CNI, and I hope that you'll be able to join us there. We are doing another JISC-CNI joint meeting. You've got data on that. That will start with a reception on the night of the 5th, and we'll run through the 6th of July. It will be held in Oxford. We've pretty much got the schedule together on that now, and Joan or I will be putting a pointer out, I would say probably later this week, that will take you to a website with information on that if you're interested. I also want to note one other meeting that we are joint sponsoring. This came out too late to get on the page of future meetings, but we do have some handouts out at the registration desk. That's the 5th incarnation of the designing libraries for the 21st century meeting. It will be held September 18th through 20th of this year at the University of Calgary. It's cosponsored by CNI, the University of Calgary, and the North Carolina State University Libraries, and I know a number of folks here have been to earlier meetings in the series, and I'm delighted that we'll be going forward with another one this year. The other thing I want to do is just say a few thank yous. The heart of this meeting in many ways is the breakout sessions, and I'd like to call for a really good round of applause for all of the people who contributed wonderful breakout sessions to this meeting. Thank you. We will be getting the follow-on material from those breakout sessions up on the website over the next few weeks, as well as videos, so stay tuned for that. I'd like to say a thank you, not just to the CNI staff, but also to some folks who came from the University of Texas at San Antonio to help us out with some of the session setup and AV. A big round of applause to them and to all of the folks at CNI who put this meeting together and made it run really smoothly. Thank you. And with that, let me get to the main event. So this is going to be a plenary with three speakers here. I actually am going to take a couple of minutes at the front to put some of this in context because this is a plenary that sits very close to one of the core concerns that we are spending time on at CNI, and so I want to just make that connection and underscore it really strongly. This is going to be recorded, and we will make the video available, but we are not going to capture the discussion and Q&A at the end for posterity. So if you want to enjoy that, if you want to benefit from that and share in that, it's a really good thing you're here because it's going to be your one and only opportunity to do so. Hopefully that is going to give us an opportunity to talk, frankly, about some issues that get a little interesting sometimes. So let me frame this a bit. One of the key jobs of the research library community, of course, is and always has been to preserve the scholarly record, but a second responsibility of the research library system collectively in partnership with archives, museums, and many other memory organizations is to ensure that we preserve and organize and collect the evidence which is going to be critical for current scholarship and for scholarship going into the future. A lot of that evidence exists out in the world. It's the actions of individuals and corporations and government bodies. It's the work of not just scholars, but of artists and political figures and legal figures and other folks. We'll never collect all of this, of course, but it's essential that we collect a really good, diverse base of it in order to make sure that it's there for people who want to understand and extract insights into the world as it exists and as it had existed. The parameters around this collection are very different in a world where more and more of our creations and more and more of the documentation of our activities is in digital form. It's easy to think about this as a digital preservation problem, and that is deeply misleading in a certain sense. It really is a problem about collecting and managing and about stewardship broadly. If you can't collect it, you can't preserve it. If your collections are under attack and their integrity is undermined, it becomes very difficult to talk about being sure that the evidence is there to support future scholarship. Parts of the cultural record have, I think, always been controversial. They've always been contested. There seem to be parties who feel that there are certain memories that shouldn't be there anymore, certain actions that shouldn't be documented and shouldn't be public. And as society, we struggle with these kinds of things all the time. Often there are legitimate trade-offs in there. There are privacy considerations. There are commercial considerations. There are national security considerations. I often find myself wondering, actually, whether the presence of controversy and contesting around parts of the record may not be a signal that these are particularly interesting materials, particularly potentially fruitful evidence for scholars, because clearly there are differences of opinion about how to assess them and how to interpret them, at least in the present time. We are very familiar with situations where one nation's state secrets are evidence of human rights violations in other countries or are viewed that way. It feels to me like in the digital world, the various avenues and instruments through which people can attempt to suppress or disrupt or contest parts of the evidentiary record, the cultural record, are, if anything, more numerous. The countermeasures, perhaps, are also more numerous. I think, though, that we are moving into what is a different world and that our stewardship organizations face really deep challenges in terms of rethinking how they proceed on their mission. Sometimes you have to be pretty courageous as a stewardship institution and take a stand on some of these things. Decide that you are going to step up to stewardship of some particular body of evidence. And we're going to talk about some case studies of all of these kinds of situations today. I am going to go over there and learn quietly. I'm very flattered that our presenters today have asked me to join them in the Q&A in the flattering hopes that I can help with that conversation perhaps a little bit. But I hope that that gives you a frame for why I am so pleased to bring this plenary to CNI and why I think it's so important in the context of CNI's mission and programmatic objectives. I'd like to make three introductions here, although I think these folks are going to be familiar to many of you, at least, going in this direction, Todd Grappone, Elizabeth McCauley, and Heather Brinston, who is stepping in very late for Sharon Farb, who very unfortunately was unable to be here, but I think that Heather is going to do a superb job that would make Sharon proud in helping to advance this conversation. I'm not going to waste time with their biographies. You can find all of that on our website. I am simply going to, at this point, welcome these folks. Say thanks again and turn it over to Todd. Thanks, Cliff. I'm going to show a short movie here to get us started. Chris, how does that video, how does it make you feel? Do you have a little bit of yourself in that? Some of the collections you do? There's documentation in there that people don't want you to see. A lot of it, I think, looks pretty innocuous. But to some organizations it's secret and they don't want you to have it and to share it. Some of those videos we saw are pretty scary and there's governments that don't want you to see it and don't want us to share it. And today that's what we're going to talk a little bit about. Just as an overview to our presentation, these are some of the themes we're going to hit on today. The mission of the university library, the academic library. We've always collected history. Some of the collecting we are doing looks a little different now and some of the tools we use are different, but it's still history. We're trying to use these tools to preserve the broad historical record and we're very concerned about privacy when it comes to the people we work with. These are people who have sacrificed a lot personally. Their families are in danger often. We need to be very concerned about the people we partner with. And it's about trust. We trust people who partner with us, who have this content, who are of interest, so to speak, to certain places. They need to trust us that we will follow through with what we say. Which of your organizations, can I see a show of hands, uses cloud infrastructure services? A lot of us do, mine certainly does. Those cloud infrastructure services, they make a lot of sense to us economically. They allow us to really focus more on the research mission as opposed to the IT mission of the university. When we move our services and our platforms to something like Amazon Web Services, it makes a lot of sense for us as an organization. But that movement to the cloud, as it's happened over the past decade, it's not just an academic library thing. It's an industry-wide thing. It's an effort that has impacted just about every news organization and every communication vehicle. And what that's led to is a decentralization of the web. So when I first got into IT, the first thing I would do when I began a new job would be to go and unpack a nice sun server, set up an Apache or some other web server, and then we'd get content up online. These days, I buy a hosted service at Amazon, and it comes pre-built with a lot of the tools and services I need. That's all very convenient. It allows me to do my work in a different way. That decentralization of services, however, has had a big impact on dissenting voices. People who have something to say about an organization, their government, they don't want to do it on the web these days, which has become controlled by a smaller group of technology companies, device manufacturers, and underneath the regime of a few governments. It's really had a chilling effect on free speech. Last week, Jason Griffey from Harvard wrote this interesting piece on Boing Boing talking about the future of the web. Jason was talking about why the library should be supporting free and open access, anonymous access to the Internet. He was talking about it in terms of public libraries. I think we in academic libraries, we enjoy a little more anonymity. Recent news from the UC system aside. A little more anonymity, I think, than a lot of our public library colleagues have. Jason in his article was talking about freedom of speech and anonymity and why those things were important and how libraries can help support that. He talked about the library freedom project and the Kilton public libraries project to install an anonymous relay in their library. I read this and I thought, I wish he could have posted this two weeks from now because it's a lot of the same things that I wanted to talk about today. It's true. We need to be able to support free speech. We need to be able to support open access in a way that our patrons feel like they can enjoy the anonymity that they need in order to have dissenting discussions. Jason was really talking about it in terms of supporting patron access. And while we don't provide these tools for our patrons at UCLA, we do use some of these tools to collect the connection, collect the collections we're about to talk about. So I wanted to start off by, we're going to do a couple of case studies here and you're going to hear about some of the projects we do. And again, we're going to harken back to some of the themes we talked about originally. The first project I want to talk to you about is this project called the International Digital Ephemeral Project. We've been doing it for about four years. What the goal of the project is is to partner with international libraries to digitize parts of their collection that they might not think about digitizing. And it's been a lot of fun. We've got national partners with the National Library of Cuba, the National Library of Armenia, and the National Library of Israel, a number of other smaller regional partners. And we feel like it's going great. But that's not really the story. The story is at the beginning of the project, I gave a reporter from the Daily Bruin an interview about the project. I had mentioned some of the collections that we found with our first partner in Israel, and some of those collections were very political and counter to the Israeli government. I just made a quip about where archivists, not activists, but we really enjoy this kind of work. What happened is we had a couple of projects that were going on at UCLA. We had students who were in Tahrir Square during the Egyptian uprising. This is one of the things they collected, by the way, in Tahrir Square. They were there just to really study. And they happened to be there, and they happened to collect a chunk of ephemeral content that was distributed during the uprising. But they also collected a number of tweets. They collected about 400,000 tweets from about 50,000 users, and they collected all of these tweets within 200 miles of Cairo. And as we started working with these collections, we started noticing something about Twitter collecting and about one of the things that the centralization of the Internet has meant is that the information we post there is inherently ephemeral. That information relies on it being current, it being popular. And when we started working with this collection a few years after the Egyptian Revolution, we noticed that a large and disturbing number of references within the tweets were gone, and 60% of those were not archived. This is something that we need to remember if we're interested in collecting the kind of political speech that goes on these days. Two weeks ago, there was a bombing in Belgium. We started collecting tweets and other social media related to that bombing. And when we looked at that collection, this is a two-week-old collection, we'd noticed that the references when those tweets were degrading at about 20% a week. Now, a lot of that, I think, has to do with the ephemeral nature of the Web. A lot of that has to do with what's being connected to these documents, to these tweets, the references they make. But the important thing about doing this kind of collecting, one of the difficulties is you have to really do it in real time. You can't decide today that you're going to start collecting tweets from events that happened four years ago or 30 years ago, it's just not going to work. It's got to be in real time. The most tweeted reference link from the Egyptian Revolution was this picture. I'm sure a lot of you have seen it. It's a picture of a circle of Christians praying, being surrounded by Muslims. And this was a picture that went out across the globe. It got picked up in a number of places. But the reference within that tweet was gone a few years later. And it took some digging for us to find it. But in a collection of 400,000 tweets, we're just not going to dig a lot. It just doesn't make a lot of sense. So we dug up this one as an exemplar. But one of the difficulties in making these collections is really the ephemeral nature of the content and how quickly you have to get it. One of the other partners we started with a few years ago was a gentleman named Ali Jamshidi. Los Angeles has a very large number of Iranian expats. And Ali was what I thought was one of those folks. When the Egyptian Revolution broke out in 2009, Ali was a graduate student in computer science in Russia. And when he found out about what was going on in his home country, he started writing and blogging about it. His journey is a fascinating one from Russia. You saw him in our opening video. He had to basically run around the globe in front of the Iranian government. And one of his stops was in Malaysia where the Secret Service questioned him for a number of hours about his activity. One of the things I wanted to mention is this is a website that we captured after he was in Los Angeles. It's a website that he put up as part of the Green Movement that is a positive message. It was intended to be a positive message about the politics, the political movement and the people. This website was hacked maybe six months after they put it up. The message was subtly changed to talk about Ali being a criminal. His activities were criminal. And for when we started the project without Ali, this would have been the only version of the website we had. But we partnered with Ali. We got the original files and we were able to pull it together. So if you think about modern political protest, it looks a lot different than what happened with our election. I think it was 2000 with the hanging chads. Where we, by and large as a society, let the law handle it. In a lot of other countries, they just don't have that kind of faith. And what they do is they use their cell phones and they use their other electronic devices to document what's going on day to day in their lives. And in the Green Movement in 2009, they really wanted to share this video content. It was, by and large, one of the first Arab Spring uprisings. It was the Twitter revolution. And after the protests of the election, the people on the ground were starting to share content. They wanted to get it out and the government began shutting off parts of the internet. And they started using different proxy servers to move content out and to give it to safe havens and give it to people they trusted like Ali Jamshidi in Russia to share. This type of activity is typical of political discussion. We're going to go where they aren't in order to get our stuff out. And that's often off the central internet. And that's a real challenge for us as we try to collect this content. The content becomes harder to track and it becomes very hard to collect. And we typically in libraries don't use these tools to make our collections available. And we need to be pretty open to doing new kinds of things. Just as a side note, at one point in time in my career I had been working in college IT and we had moved to Google Apps for Education. And we did it over the summer. And almost two days after we had initiated it for our students, I got a phone call from a group of students in China saying I can't get to my email. And we quickly figured out that they were being firewalled by the government or Google was at that point in time. And I found myself in an interesting situation where I could tell my students how to break the law in China or I could try to help them do something myself. And we ended up providing a different kind of access for them. But, you know, these are the kind of things that can happen when you get outside your comfort zone. This is a picture of Ali. He did a lot of vlogging and blogging and all kinds of stuff in the 2000s to make sure that the voices in the green movement were heard. He became a fairly well known activist around the globe. After he worked for us at UCLA for a while, he went to work at an organization called Internews, which is an international NGO, teaching activists how to communicate safely, how to communicate and keep their anonymity and their privacy. And I wanted to say that what Ali does for us is he puts a very well known trusted face on our collecting. I can go out through Ali to a number of places who have collected or are collecting dissenting opinions and dissenting documentation and offer preservation and hosting services for them. And what we have with Ali is a partner who they are familiar with, who they trust. He gives us instant credibility with activists and instant access to a lot of their collections. So we're talking about some very sensitive stuff. We've got stuff that people and organizations don't want you to see. And hackers happen. It happens to a lot of us every day. You might think it's odd that we would collect these things to make ourselves a bigger target. I don't have any super answers for you in terms of information security because we don't do anything special. We just try to focus on best practices. We try to find a balance between policy, privacy and security. I do want to say that the best approach to information security that I found for some of these collections, depending on their volatility, is just to simply not accession them to collect them. We believe in terms of some of this content that preservation is more important than access and that it's better that these collections exist than don't. One of the other things to remember is really you have to have some flexibility. I've heard a few times from some of my folks, oh, you can't do that. You can't open that firewall port. But you have to be able to do that. You have to be able to get some flexibility, do some things you're not really comfortable doing in order to collect this content. And we feel like it's very, very important. So, just a few more case studies from me back to the International Digital Ephemeral Project. One of the things we thought would be really interesting and great is if we could get some digitization equipment in the path of Syrian refugees just to see sort of what they had. We found a partner in American University in Iraqi Sulamani, which is in Iraqi Kurdistan. It's one of these over here. They had a good number of Syrian refugees going through there. We partnered with a faculty member there who was interested in digitizing content with her students, basically as a teaching and learning tool. And we were interested to see just basically what they would dig up. What we found was not quite what we expected. What you're seeing here is a book from Abu Ghraib Prison, which is a prison inside Iraq. It was a political prison under Saddam Hussein, a political prison under the United States regime. And it's not quite what we expected, but it's what we got. This story comes from one of the students at American University Iraq, Sulamani. It's a religious text. It's mislabeled for some obfuscation. It's a banned book in Iraq. One of the other things we found was a couple of notes hidden within them. One of these notes basically says you need to take this out into the sun in order to read the hidden text. Kind of a funny thing to write. Sunlight's not hard to find in the Middle East, I would imagine. But it also says, in that hidden text, it says, I hid the books and guns with my family. And I kept, I put it there so that our family would be safe. And I just, you know, I think it's interesting that these certain repressive regimes around the globe find both books and guns equally as dangerous. The other note is a note from a father to a son. Promising him a bicycle if he does well in his exams. His father was in prison for about 10 years. It took this note about two years to get out. And by the time it did get out, he had learned how to read. He had passed his exams. So one, you know, one thing I'd say that, you know, I've said this a few times but not directly is really when you get outside of doing the, when you get outside and you start doing this kind of collecting, you face difficulties. You face technical difficulties. You face difficulties in terms of, it's really hard to build trust relationships. It takes a lot of time. But you get a lot of wonderful things that happen to you. You know, we do, we have a lot of serendipity in the collecting we do. We didn't expect this book and note from Abu Ghraib but we got it and we think it's wonderful. And we think it's stories like this that make the kind of activities we're doing important. Lisa. Hi everyone. It's a real honor to be here in front of you today and I'm grateful for the opportunity to talk to you. My name is Lisa McCauley. I'm at the UCLA library where I work in the digital library program. And I'd like to just take a moment. You've heard a bunch of different case studies from Todd and you'll hear a few more from me and later from Heather. And you saw the opening video where we talked about things that we have, some of those things we haven't talked about before in public and are not readily available. And I'm pretty sure, in fact, we kind of reached out to colleagues across the country when we were preparing this talk and we heard about collections that you all have as well that are exactly like this. And one esteemed colleague said, oh yeah, we take a lot of stuff in and we just don't tell anyone we have it. So I'd like you, and you know, I guess there are some good reasons for that which Todd pointed out. So I'd like you to take just a couple of minutes, turn to somebody next to you, somebody you know, somebody you don't know. And so either one of you have any collections like that or something that comes to mind or something that has brought controversy either in your university or beyond. So I'll just give you about two minutes to talk amongst yourselves. Okay, I'll ask you to finish up if you can to say your last few words. All right, thank you. I'm kind of excited to have heard so much chatter. I was a little afraid it might be quiet at the end of the afternoon here. So I'm glad you found stuff to talk about. Now you can probably guess what I'm going to ask you to do next. How about a couple of volunteers to either rat on your neighbor or talk about something that you feel that you can talk about in front of the cameras. As Cliff said, we're going to turn off the cameras later so that you can talk more frankly and so that we can talk more frankly. Any volunteers? Thank you. I think Todd knows some of this. We've been on panels together. I run an education program so we don't have a collection, but our graduates work in collections, including collections of human rights organizations, both witness and human rights watch, both of which put cameras in the hands of people in incredibly horrific situations. Women getting stoned, like with stones. And so these things, though the goal is to inform the rest of the world about what has happened, just putting unredacted pieces of these videos out there will result in murder of the people who took the videos. So it's a matter of redacting things. And recently, actually about three weeks ago, Human Rights Watch got hacked. They thought they had very high security and the hackers took some of the original material unredacted and they're incredibly worried about what could happen with that. So getting hacked is another issue even for when you have this material not offline but not cataloged or whatever. Excellent example. Thank you so much. Anyone else? Example, controversial collection, dangerous collection. Okay, we'll come back to that topic later. I want to just turn to a couple of case examples. This is part of the collection that you saw earlier in the video from a group of librarians who work together to take digital versions of highly sensitive documents from inside China. Documents that in this case were absolutely confidential, as marked here, and distributed only very narrowly. And as you can see, this is from 1950 so maybe it's not so risky anymore to sneak this material out but I want to remind you that just earlier this year in January publishers in Hong Kong were found missing and protesters in Hong Kong took to the streets and in particular they were concerned about the lack, the encroaching Chinese government on the freedom that Hong Kong has enjoyed up until now. And so these are still quite dangerous propositions for people and here are librarians and archivists inside China just like us who think that it's more important to get this information out than to be completely safe. And so this is one of the collections that we don't have available at this moment but that we hope to make available soon. And again, as Todd had pointed out, it's one nation's state secrets and for us it's information about how that state maintained control, how it ran its government in ways that we're interested in finding out more about and bringing to the light a lot of devastation and oppression that happened during that era and continues to happen. I also like to turn a little bit to how to make relationships work and this has been really key to everything that we've worked on in the projects that Todd presented and I want to highlight a few that we've worked on and the number one thing that Todd pointed out was that this kind of work doesn't happen easily and it doesn't happen quickly and in this slide I show several of our partners for a project that we're working on in the Sinai Desert in Egypt and we talked about working together for at least five years before any pixels or digitization or any sort of work or collaboration happened and at any point during that time there's a lot of time invested in planning and thinking through and talking through activities and this is where I sort of highlight one of the risks in this kind of collecting is that at any point it could have fallen through, it might not have worked and it was a huge risk on both the partners that we're working with and both from our point of view that we would invest a lot of time in a relationship or a project that might not come to fruition but we had faith and some trust and we decided to go for it and to see what we could learn at the worst we could learn something and we might not have this project come to fruition but we could learn from each other and so one of the things that underlies a lot of this type of collecting especially you'll notice like the Chinese documents and the green movement videos these are materials that are digital and they don't need to reside with just one owner and that's really enabled us to move into fairly easily into post-custodial archive building which many of you are probably familiar with and it's really suiting when you're working with international partners or any sort of cultural group that is different from your own especially coming from the United States as a imperial and colonial power that we do not go in, take the goods and run out so these materials speak for the people in their area they have a context, they have a place of origin and we want to work together and we want to bring resources to these collections without taking the collections away and without taking them out of context where they have meaning and where the people who own them can make sense of them in a way that outsiders cannot and so through doing that we really have to promote authenticity and that's one of the things we've been able to do working with Ali Jamshidi and he's hired and recruited graduate students from Iran who work with him and who have done really elaborate metadata for us and I'm so impressed with the detail and level of work these students do who are not library students who are not in the information profession they're pursuing degrees in advanced degrees in language studies completely dedicated to this project and in August when I was trying to fix a time sheet for one of them I checked in with Ali and said oh I got to send this over no you can't send that to him, he's in Iran right now and that would put him in danger so these are people who are really putting a lot of effort into these collections and that's where the authenticity comes from that we're not coming in taking collections we're actually letting the people who this content mean something describe it and then we work with them of course to talk about the things that we do understand which are metadata standards, description, fields managing files, file names, repositories, moving files around and all in an effort to preserve these files especially the cell phone videos from Ali a lot of these were decaying rapidly because these are proprietary formats all sorts of formats all across the gamut that we wanted to convert to something more stable and so we pursue a policy of joint publication without acquisition so through memorandums of understanding and there's term limits in them so it's not like anybody's locked into anything but that creates this sense of trust and faith where we can work together and gain from the collaboration and so from the Sinai project this is one of the examples we used multi-spectral imaging with a very sophisticated digitization setup that traveled to Sinai where there is no internet in the organization where they're working and power is not always guaranteed but most of the time it's there and this is an example of a hidden text, a medical text underneath a later manuscript and this is what it looks like in that area so it's just a very different atmosphere to work in than what we're used to working in and it really though made sense to take the material take the digitization equipment and the collaboration to the site of origin rather than the other way around and one of the things that's super critical for this area is while these materials are medieval manuscripts that we're working on and a lot of times we can say well they've been around for a thousand years they're on parchment, they're going to hang in there they're going to be just fine but they're in a region that is highly unstable and as we know from things that have happened in Tunisia and other places throughout Northern Africa these materials may have been stable for a long time but that doesn't mean they'll be respected by all people around them and this is currently a highly fundamentalist area so it's more at risk than it used to be and lastly I'll talk about just another collaboration that Todd mentioned which is with the National Library of Cuba and again this organization is very sophisticated they don't need, they've been doing their own digitization for a long time but they're looking to amplify their efforts and also to have a publication partner somebody who can put things on the web in a way that they're not able to and recently just last week we sent down some digitization equipment to digitization professionals and they did training in English and Spanish and left behind documentation in Spanish and English and so that's, and this is some of the material they're going to digitize and the choice of what they're digitizing is really up to them knowing their collections and what they've been working on things are in a state like this that need digitization as an opportunity to preserve the material and so I'm going to, at this point, turn it over to Heather who's going to talk a little bit more about the scandalous collections that we have in our possession including blank forms and other things that could get you in a lot of trouble Thank you, Lisa, yes Hello, I'm Heather Brewston I am the University Archivist at UCLA and for this afternoon I bring the scandal Alright, hopefully you can see out there this is a lovely picture of the headquarters of Scientology In 1973, UCLA was donated a Scientology collection We described it in our online catalog We have a finding aid up on the online archive of California It has nine boxes, includes 4.5 linear feet of material We've had it open for research ever since it's been processed But with greater visibility with our collections and online access comes a few more questions So in 2000, UCLA was threatened with legal action by the Church of Scientology International Now, hopefully many of you are familiar with the fact that this Church of Scientology is very litigious And they put forward such claims that the materials were stolen The materials were confidential It was covered under a priest-penitent privilege and that we should cease and desist and return all materials These are the kind of materials that we have here This happens to be, for those of you who hopefully can see this is the Sea Org contract Now, if you saw a recent documentary or have read any of the recent Tell All books about Scientology the fact that you must be willing to sign a contract to stay with it for over a billion years should not be a surprise, but yet this was one of our confidential documents That, then, is surpassed, though, however by our auditor's worksheet that is a privileged document and must be returned This is the actual document It's blank Then, we have Jenna Elfman One of the things that Sharon, if Sharon was here would be telling you about was both about the external and the internal pressure that she was receiving at that time about these collections So people from within UCLA were sending her emails asking her such questions like have you briefed the University Librarian about this including the issues because at UCLA if you are responsible for all liabilities fines, penalties, and actual damages that rise from litigation and does she agree with your views and she also received other messages that said I imagine I will shortly be getting a moderately threatening letter coupled with a request to meet with the Chancellor So, noting that these types of collections not only do we receive pressure from the outside but we can receive pressure from our own institutions She even received a call from Jenna Elfman pleading to exchange the collection for the red and green volumes that had newly been published by the Church of Scientology International Now, what I can tell you is that we still have this collection It is still available for research and people do still use it for research The Modern Archive was born in Revolution the French Revolution to be exact Rather than taking their anger out on the records they recognized that archives could serve as a record of oppression, greed, and corruption Thus the notion of the accountability value of archives was born and continues to this day In the particular case that we see here there were documents collected by three researchers between 2006 and 2011 At a point in about 2013 there began to be a real risk of preservation of the material and they started to be reformatted At about the same time these researchers began a discussion with the British Library about finding a permanent home for this collection In a recent statement refusing the collection the British Library stated that they could not take the collection because the materials are subject to copyright law and therefore there is a difficulty providing access and that the library judged that some material could contravene the terrorism act of 2006 which specifies that specific responsibilities to anyone in the UK that provides access to terrorist publications and the legal advice that they received highlighted any risk of making the materials accessible So now I have another question for all of you How many of you agree with the British Library's statement? Show of hands Nobody's going there How many of you would this archive have presented any issues? Boy, this is a bold group There's issues but it's the discussion of those issues that we're here about today Cliff spoke about this issue in his opening talk and I'm very glad that he started this conversation because I think this is one of the in some cases very troubling areas for us as archivists and librarians to discuss the right to be forgotten It is a complex issue for us because we support the idea of protection from fraud As we've seen in a lot of these contentious collections people give them to us at risk of their lives We are concerned about issues that arise from online bullying and false accusations and materials such as this but what about things that should not be forgotten? Not everyone should be forgotten especially when the result is literally changing the historical record As you know, in Europe they do have a right to be forgotten and as of May 2014 Google has removed over 1.3 million URLs from its search engine Most are removed and this should not be a surprise from Facebook, YouTube, Google groups and Twitter However, they do note that ultimate decision is made by a human regarding removal because the variables including public interest claims need to be handled on a case by case basis For example, there happened to be a British doctor who requested that over 50 links about botched medical procedures be removed In the end, Google removed three results that contained personal information about the doctor And of course, this only covers Google in Europe and so materials can often be found elsewhere This is an excerpt from our deed of gift that we actually have about the Green Movement and it is really how we go about managing and being mindful of third parties in our archives We take this and all of you who collect materials as we do take this very seriously and this is the process for every donor negotiation that we have for unique materials because there are always concerns about certain content in our collections It's also part of building trust of building that community or that relationship with our donors And it also is a way for us to discuss with our donors both the risks and rewards of access to their collections Accountability It is one of the primary functions of both libraries and archives It is part of our mission It is a core value of archivists and forms the basis of our ethics Social responsibility is another core value What we collect and preserve What is created that we are not collecting Making those choices Making those decisions and taking those actions are then the decision about how and when we provide access In 1934, FDR, when establishing the National Archives of the United States said A nation must believe in three things It must believe in the past It must believe in the future It must above all believe in the capacity of its own people So to learn from the past that they can gain in judgment in creating their own future And what I'm going to talk about next is a perfect example of that from Guatemala In 2005 in Guatemala there was an explosion near a police compound that started a search for bombs left after the war Found abandoned in a munitions depot They found it stuffed with records from the Guatemalan secret police As one person who saw it said it was filled to the brim head high with heaps of papers So now, as a project of the University of Texas the Lozano Long Institute for Latin American Studies the Rappaport Center for Human Rights and Justice and the Benson Latin American Collection with the Archivo Historico de la Policia Nacional de Guatemala we have a digitization project And part of that is this discussion and the recognition that the right to be remembered is more important than the right to be forgotten It is about preservation over access and it is concerning cultural sensitivity For those of you who might be familiar with either the Guatemala case or other cases throughout the world relating to the records of secret police forces that trust is critical to building and sustaining these both challenged collections and their content It is both legal and societal issues involved in confidentiality of both the oppressors and the oppressed the informants, the issues involved as well as topics of truth and reconciliation within those countries And so in 2009 the archive established legal certainty over the ownership of the material in cooperation with the Ministry of the Interior and the Ministry of Culture and Sport By the end of 2013 there were 15 million documents scanned about 20% of the total And in 2015 they had celebrated the first anniversary of the discovery of those heaps-high stacks of papers Another area of cultural sensitivity that I'd like to talk about this afternoon is an aspect of trust and building of trust building Historically archivists have not had always a good reputation in this area extending and reinforcing at times the cultural hegemony and appropriation In these cases I'm talking about often our treatment of and collection of materials of indigenous populations However, with the work in the United States, Canada and Australia on such best practices as the Native American protocols the discussioning, the listening the trust building and the action has begun This happens to be an example out of the University of California at Berkeley where Professor Kim Christian Whitney is doing a collaboration with the Center for Digital Archaeology at UC Berkeley on an IMLS grant to build tools In the site, I encourage you all to look at it It's referred to as Mercutu M-K-U-R-T-U That's the set of tools And they are for indigenous communities themselves as they manage and share their digital cultural heritage So as you can see here it's very much akin to Creative Commons licenses But instead, these are traditional knowledge licenses And what it is is a way for communities themselves to tag those materials whose access depend heavily on the local context from which it derives Certain materials that can only be seen by either members of the group that have reached a certain stature, for example So now, I've got another question for the audience You're on Do you have in your repositories collections from indigenous communities? Show of hands I was going to say we should have good show of hands Have you worked with the community on access and or description issues? Show of hands Marvelous! Marvelous! Now we have some new tools to use as well And so now, I would like to turn it back to Todd to finish us up Thanks, Heather It just, you know I just wanted to say in closing here that some of the things we're doing some of the collections were offered You know, we feel like we've got a pretty good background at UCLA with doing this type of collecting putting together a certain documentation that makes it possible The legal framework And, you know, we've we do have some experience working with some of these activists and their hacker colleagues And we just wanted to say if there is interest in the community in finding a group of libraries interested in doing this kind of collecting please reach out to us Reach out to me I'm sure you can find me I'm on email and Twitter And we'll see, let's start talking Howard mentioned earlier that we've already started on a panel together and we'd love to expand that conversation to others who are interested in doing the same thing I wanted to close with a quote here from our university librarian who couldn't be here today And she's, you know her position on this is really, you know that we should not be bystanders We should be actively out there collecting this content There's more and more of it that shows up on the web every day There's more and more of it that emerges It's, as I mentioned before it's hard to find, it's hard to collect But it is out there and it is possible It takes time to make those relationships with those online communities with the activists It just It just is We really feel like it's worth it We feel like there's the kind of collections we're doing the kind of collecting we're doing We hope are bold and you see them as things you'd like to do as well We'd love to bring partners in I want to thank you for your attention As Cliff mentioned, we're going to go into some Q&A now Just before we get there I'd love to say a few more words We talked a little bit about the Scientology collection but Heather didn't really mention the razor blades and the smoke alarms and all the other things that happened while we made that collection available Those things sort of happened I want to do another show of hands How many people were asked by their institution to call the State Department last year? Just me? That happened to me about six times I only called them I actually didn't call them any of those times But when you're sitting in Los Angeles and the interview is just about to be released and you go to your Chancellor and you say, I found this really great North Korean content They pause and they go, oh have you called the State Department? Right? On one hand it makes it really fun to do these kind of projects On the other hand it does make you pause You know How many How many people actually send camera operators out into the field? Anybody have partners they do digitization with? A couple? Alright, how many send their digitization partners into the Egyptian desert with $9,000 in their money belt? Just me? Yeah We began this international digital ephemera project with a partner that partner We're really interested in you guys doing Middle Eastern collecting Here's your first partner the National Library of Israel Let me tell you, when you go out and you start talking to people in the Middle East about their collections and it's the United States and Israel where you don't get a lot of answers early on It took us some time to find the right kind of angle in there and the right kind of people The last thing is one of the other challenges is really incredibly bureaucratic You often get these things when you work at large institutions and public institutions It's really easy to send a digitization equipment to Iraq It's almost impossible to send it to Cuba Right? People there, last week the president was there two weeks ago and it was just kind of funny how much trouble we had sending equipment into there You know again, it's worth it sticking with it the patients the trust building they're wonderful the outcomes are incredible Cliff mentioned earlier about being brave collectors and when you're working with a partner who couldn't go home for his mother's funeral who's been exiled from his country for 30 years He's really the brave one All we're doing is really trying to make sure that his sacrifice is remembered That's all I wanted to say I hope there's some questions