SlideShare a Scribd company logo
1 of 18
Download to read offline
Writing Portfolio
Olivia Farrow
orf2@georgetown.edu
703-505-8046
Table ofContents
Press Release.................................................................................................. 1
FactSheet.........................................................................................2
Backgrounder.................................................................................................3
Q&A ................................................................................ 4
Talking Points.................................................................................. 5
Peg/Problem/Promise................................................................................6-8
Op-Ed..........................................................................................9-10
SpecSheet..................................................................................11-12
Speech..............................................................................................13-16
Olivia Farrow
Press Release Sample
1
FOR IMMEDIATE RELEASE
June 7, 2016
CONTACT: OLIVIA FARROW
703-505-8046
Orf2@georgetown.edu
Cooper Hospital Joins Forces with Competitors:
Starts Electronic Records System
Exchange to lead the state in faster healthcare
CAMDEN, NJ- On June 7th, Cooper University Hospital will be joining forces with rivaling
hospitals Our Lady of Lourdes Medical Center and Virtua Health to create an electronic medical
records exchange.
This program will synchronize three large health organizations' databases so doctors can quickly
collect over 70,000 patients' medical histories.
"This will really speed up a patient's visit in Camden," said Jeffrey Brenner, the doctor who initiated
the Camden Coalition of Healthcare Providers. "When it's a matter of life and death, an ER nurse or
doctor needs to get the whole picture. A lot of crucial data on a patient can be accessed in moments
with an electronic medical record."
The CDC ranks medical errors as the third highest cause of death in the United States, which
equates to over 250,000 deaths in 2015. Medical errors include improper coordination of care and
diagnostic errors, which an electronic medical record exchange can alleviate.
"A lot of suffering and death can be prevented with this exchange," Dr. Brenner said in his office in
Camden. "A doctor needs to know if the patient has a history of high blood pressure, allergens, or a
history of kidney problems. If a doctor prescribes something that conflicts with a patient's
medication, that is like mixing ammonia and bleach-you don't do it. With a comprehensive medical
record at the ready, doctors will be able to circumvent a lot of medical errors."
Currently, the United States economy spends one out of every six dollars on healthcare, including
medical record infrastructure.
**
2
Olivia Farrow
Fact Sheet Sample
Fact Sheet: The International Monetary Fund
The IMF's Function:
• Ensure the stability of exchange rates and international payments for countries and it's
peoples.
o Executed through providing loans and establishing financial safeguards
o Providing management advice for economic projects
The IMF's Resources:
• Financial resources are through member quotas
o Quotas reflect each members' position in the global economy
The IMF at A Glance:
• 189 member countries
• Headquarters: Washington, D.C.
• Managing Director: ChristineLagarde
• Executive Board: 24 Directors representing countries or groups of countries
• Staff: Approximately 2,663 from 148 countries
• Total quotas: US$650 billion as of March 2016.
• Additional pledged or committed resources: US $642billion
• Biggest borrowers as of March 2016: Portugal, Greece, Ukraine, Ireland
The IMF's Beginnings:
• First proposed at the United Nations conference in Bretton Woods, New Hampshire,
United States, July 1944.
• Initially began with 44 governments.
• Goal was to build economic infrastructures and safeguards to prevent competitive
devaluations of currencies in the Great Depression of the 1930s.
The IMF’s Governance:
• Leadership consists of member countries' governments
o Board of Governors consists of one Governor and one Alternate Governor from
each member country
3
Olivia Farrow
Background Sample
Background: The International Monetary Fund
History:
The IMF, also known as the Fund, was first proposed at the United Nations conference in Bretton
Woods, New Hampshire, United States, July 1944. The 44 governments represented at that
conference sought to build a framework for economic cooperation to avoid a repetition of the
vicious circle of currency fluctuations that contributed to the Great Depression of the 1930s.
Function:
The Fund's primary function is to provide loans and economic safeguards to countries in economic
duress. Such functions are executed through providing loans and establishing financial accountability
in the world economy. These functions are further carried out through providing technical assistance
to ensure IMF funded programs improve living standards and economic stability.
The IMF's Resources:
The Fund's financial resources are through member countries' contributions. Quotas reflect each
members' position in the global economy. The current total quotas as of March 2016 are US $650
billion US dollars. The Fund has an additional pledged or committed resources of 642 billion US
dollars.
The IMF’s Governance:
The Fund's leadership consists of member countries' governments, specifically through its Board of
Governors. The Fund's Board of Governors consists of one Governor and one Alternate Governor
from each member country. There are now 24 Directors representing countries or groups of
countries as of June 2016.
The IMF Today:
The Fund now has 189 member countries. Headquartered in Washington, DC, the Fund has
approximately 2663 employees from 148 countries. The Fund's most notable project to date has
been the bailout of the country of Greece to the sum of 110 billion Euros in 2010 and an additional
100 billion Euros in 2011. The Funds' biggest borrowers as of March 2016 are Portugal, Greece,
Ukraine, and Ireland.
4
Olivia Farrow
Q&A Sample
Q&A: The International Monetary Fund
Q: What does the IMF do?
A: The International Monetary Fund, or the Fund, ensures the stability of exchange rates and
international payments for countries and it's peoples. These goals are executed through providing
loans and establishing financial safeguards to its' member nations. The Fund also provides economic
analysis on the global economy.
Q: When and where was the IMF founded?
A: The Fund was organized at the United Nations conference in Bretton Woods, New Hampshire,
United States, July 1944.
Q: Wby was the IMF founded?
A: The founding members of the Fund sought to build a framework for economic cooperation to
avoid a repetition of the vicious circle of competitive devaluations that contributed to the Great
Depression of the 1930s.
Q: How does the IMF get its' funding?
A: The Fund's financial resources are through member countries' contributions. Quotas reflect each
members' position in the global economy.
Q: How many countries have membership with the IMF?
A: The Fund has 189 member countries.
Q: How much money does the IMF have in quotas?
A: The current total quotas as of 3/9/16 are US $650 billion. The Fund has an additional pledged or
committed resources of US $642 billion.
Q: What is a notable project that the IMF has undergone recently?
A: The Fund's most notable project to date has been the bailout of the country of Greece to the
sum of 110 billion Euros in 2010 and an additional 100 billion Euros in 2011.
Q: Where can I learn more about the IMF?
A: For more information please visit www.imf.org.
5
Olivia Farrow
Talking PointsSample
Talking Points: The International Monetary Fund
Overview:
• The IMF's Function:
o Ensure the stability of exchange rates and international payments for countries
o Executed through providing loans and establishing financialsafeguards
o Goal was to build economic infrastructures and safeguards to prevent competitive
devaluations of currencies in the Great Depression of the 1930s.
The IMF At A Glance:
• 189 member countries
• Headquarters: Washington, D.C.
• Executive Board: 24 Directors representing countries or groups of countries
• Managing Director: ChristineLagarde
• Staff: Approximately 2,663 from 148 countries
• Total quotas: US$650 billion (as of 3/9/16)
• Additional pledged or committed resources: US $642 billion
• Biggest borrowers (as of 2/29/16):Portugal, Greece, Ukraine, Ireland
The IMF's Resources:
• Financial resources are through member quotas
o Quotas reflect each members' position in the global economy
The IMF's Governance:
• Leadership consists of member countries' governments
o Board of Governors consists of one Governor and one Alternate Governor from
each member country
Timeline:
July 1944: First proposed at the United Nations conference in New Hampshire.
March 1947: The Fund begins operations.
May 1947: First drawing from the Fund by France.
May 1976: The Fund decides on policies and procedures for selling gold.
May 1992: The Fund approves membership of countries of the former Soviet Union.
October 2008: The Fund offers $100 billion to countries harmed by the financial crises
2010-2011: The Fund loans the country of Greece 110 billion Euros and an additional 100
billion Euros in 2011.
October 2016: Chinese renminbi added to list of world currencies on reserve
6
Olivia Farrow
Peg/Problem/PromiseSample
Topic: Contributory Negligence Bill
Pro:
Peg: On Tuesday, the DC City Council decided to postpone their vote on providing crash victims
compensation in collisions.
Problem: The current law in DC for pedestrians and cyclists is that if they are found even slightly
responsible for a collision with a car, they cannot receive any compensation.
Promise: DC City Council should pass the proposed bill that would provide compensation to
pedestrians and cyclists who are harmed in crashes.
Con:
Peg: On Tuesday, the DC City Council decided to postpone their vote on providing crash victims
compensation in collisions.
Problem: If DC City Council passes the proposed bill, auto insurance rates for DC drivers will
increase an additional 600 dollars a year.
Promise: Though the proposed bill seems like a good idea, it would cost DC drivers exorbitant
amounts of money for a small number of crashes.
Topic: Banning Fashion Ads
Pro:
Peg: This month, London Mayor Sadiq Khan announced that London transportation would no
longer run ads featuring unrealistically skinny women.
Problem: Ads that promote women who are dangerously thin is demeaning to women and makes
them ashamed of their bodies.
Promise: London's new ban of these kinds of ads will encourage responsible advertising that is
respectful to women of all shapes and sizes.
Con:
Peg: This month, London Mayor Sadiq Khan announced that London transportation would no
longer run ads featuring unrealistically skinny women.
Problem: Banning ads featuring women who are thin is still encouraging people to judge women
based on the size of their bodies, no matter how large or small they are.
Promise: Public transportation in London should not try to censor ads with skinny women because
society will still judge women because of their sizes anyway, even if it is not in public transportation.
7
Olivia Farrow
Peg/Problem/PromiseSample
Topic: The Problems with Vocal Fry
Pro:
Peg: Many women in their 20s and 30s have developed a speaking pattern called 'vocal fry,' in
which the speaker uses long sentences and a guttural, soft spoken voice.
Problem: Women should be mindful of avoiding vocal fry if they are to move up in the workplace,
as this pattern of speech can be a barrier to advancement because of their apparent lack of
professionalism.
Promise: If women stop using vocal fry, they will be respected by their elders and advance in the
workplace.
Con:
Peg: Many women in their 20s and 30s have developed a speaking pattern called 'vocal fry,' in
which the speaker uses long sentences and a guttural, soft spoken voice.
Problem: Vocal fry is not a problem with the young women using this speech pattern: it is a
symptom of misogynistic standards that find fault with women no matter how they speak.
Promise: Vocal fry is not a symptom of unprofessional young women in the workplace, but a sign
that culture is policing young women's voices.
Topic: Federal Election Commission charging Fox News for Republican Primary Debates
Pro:
Peg: The Federal Election Commission's Democratic Commissioners voted last week to pursue
legal action against Fox News, charging that the network unfairly excluded candidates from
participating in the Republican Primary Debates.
Problem: Candidate Mark Everson was unjustly blocked from debating because Fox News did not
follow objective selection criteria set up by FEC regulations.
Promise: The Democratic Commissioners are in the right to charge Fox News with failing to follow
FEC political debate laws, as Mark Everson met the criteria to be eligible to be in the Republican
Primary Debates but was still not allowed to participate.
Con:
Peg: The Federal Election Commission's Democratic Commissioners voted last week to pursue
legal action against Fox News, charging that the network unfairly excluded candidates from
participating in the Republican Primary Debates.
Olivia Farrow
Peg/Problem/PromiseSample
8
Problem: Under the FEC regulations, Fox News was left with very little room to differentiate
candidates and had to make executive calls about who would and would not be eligible to debate.
Promise: Fox News had to make due with the difficult situation in an overcrowded candidate field
and used their right under the First Amendment of freedom of the press to not invite Mark Everson
in the GOP primary debates.
Topic: Montgomery Study on Plastic Bag Tax
Pro:
Peg: Last week, Montgomery, Maryland released their findings of a study of the impacts of a tax on
plastic bags that is now four years old.
Problem: The recent study shows that the plastic bag tax has reduced plastic bag sales in
convenience stores and department stores, reducing trash and waste that would otherwise pollute
the Anacostia River.
Promise: Montgomery's study on plastic bag taxes proves that such programs are effective for
improving the environment in Maryland.
Con:
Peg: Last week, Montgomery, Maryland released their findings of a study of the impacts of a tax on
plastic bags that is now four years old.
Problem: The results of the study found that while plastic bag sales have dropped in convenience
stores and department stores, plastic bag sales have increased 3.2 percent in grocery stores since the
tax began.
Promise: Montgomery's study on plastic bag taxes proves that unless there is an outright ban on
plastic bags, people will continue to use environmentally harmful plastic bags.
9
Olivia Farrow
Op-Ed Sample
h
Preventing terrorism requires people, not search algorithms
In response to recent terrorist attacks, on June 15, Hillary Clinton reinvigorated her
proposal for a partnership with social media firms and government surveillance agencies. This
partnership assumes that terrorism can be prevented by increasing surveillance capabilities on social
media platforms. While Ms. Clinton’s proposal may seem like a good idea, the effectiveness of such
a policy is unfounded and dangerous.
The capabilities of search algorithms are greatly overestimated, especially when trying to
understand human behavior. Ms. Clinton's proposed surveillance program would heavily rely upon
scientifically derived values from computer systems belonging to companies like Facebook and
Twitter. From these search systems, a risk score, similar to a credit score, would be assigned to
suspicious users. If a scan from these search algorithms detected dangerous activity on public and
private posts and messages, an alarm would be raised. Search algorithm results can only be
programmed as well as the person who designed it. Silicon Valley engineers are not antiterrorist
experts, so the scope of what algorithms can do for finding terrorist activity online is limited. A
search system cannot detect unique human quirks that frequently appear in social media messages
and posts, such as tone, context, or lingo. Despite recent developments in technology, only a human
can make judgment calls like understanding a sarcastic post. Twitter has also stated that there are still
technological limitations in detecting videos and photos. The product of a counterterrorist program
that relies on erratic methods like Ms. Clinton's will lead to bad enforcement.
In the world of online media and extremism, talk is cheap. Many people release thousands of
extremist posts every day, but none of them will turn into an actual act. The FBI has explained this
conundrum in the wake of several terrorist attacks, such as the events in Orlando and San
Bernardino. In both incidents, the assailants pledged allegiance to ISIS online and were being
monitored before the attacks. However, enforcement agencies were unable to find legal grounds to
arrest the person in question. This is because while the suspect posted suspicious material, they did
not actually do anything related to terrorism. The FBI can only act on an extremist post if the suspect
has sent money to a known terrorist account or left the country in the likelihood that they are
receiving terrorist training. Neither of these actions can be proven from social media posts.
Additionally, counterintelligence experts have explained that a search algorithm detecting suspicious
posts results in thousands of false alarms. Someone may foolishly post something that is detected by
Olivia Farrow
Op-Ed Sample
10
Silicon Valley's systems, sirens blare, and government agents wind up inspecting a dead end. False
alarms may compromise a legitimate investigation. These distractions cost an incredible amount of
taxpayer funded resources, which can be better spent on substantiated leads generated from humans,
not machines.
A government that has a blanket approach on surveillance for both public and private social
media messages violates its citizens' right to privacy and free speech. Every private Facebook
message or offline Tweet could be subject to government scrutiny under Ms. Clinton's proposal.
These freedoms are compromised to not only those who sympathize with extremists, but innocent
Americans as well. When Americans know that all communication channels are being monitored,
whether it is private or public, Americans involuntarily act differently. Massive surveillance without
due process can stifle legally protected social change. Extremism does not automatically mean illegal
acts are at hand. Black Lives Matter organizers and NRA campaigners are seen as extremists to the
government as well. Both of these groups have already cited increased shadowing from both
technology firms and government agencies. Government-led surveillance operations have been used
on Martin Luther King Jr., a fact that still haunts the FBI today. Most results from a program like
Ms. Clinton's would result in no illegal behavior from these groups, only burdensome falsealarms.
It is comforting to assume terrorism could be prevented by a simple computer program like
Ms. Clinton's. Unfortunately, the effectiveness of such a policy is unproven and dangerous. This has
been proven from both the private and government sectors citing the limitations of technology's
ability to understand human behavior. Relying on such search algorithms will result in costly false
alarms that can jeopardize investigations. The threat of denying all Americans, specifically innocent
citizens, from privacy and free speech is even more ominous in such a surveillance policy. While
computers are incredibly powerful, they still cannot deter a terrorist.
11
SPEECH SPEC SHEET
Olivia Farrow
Spec Sheet Sample 1
JIM HARPER, CATO INSTITUTE TECH CONFRENCE
SPEAKER:
DATE:
Jim Harper, Senior Fellow, Cato Institute
Wednesday, August 10, 2016
EVENT START/END TIME: 10:00 AM- 11:30 AM
SPEECH TIME:
SPEAKER BEFOREYOU:
LOCATION:
10:50 AM to 11:00 AM. 10 Minutes HARD STOP.
John Bolton, Former UN Ambassador 10:30-10:45 AM
555 Pennsylvania Ave NW, Washington, DC 20001
Annenberg Theater, 7th Floor
Use the 6th Street entrance on the left side of the building.
LOCATION: Enter at Level 1
Elevators are the first thing you will see after security.
Large bags and backpacks are prohibited.
STAGE SETUP: Elevated platform (two steps elevated)
Podium is set up on the front patio of the store
the podium will be Stage Right
SIZE: 170 feet long, 55 feet wide, 90 feet high
450 seats, 348 RSVPs confirmed
AUDIENCE: Leaders and researchers in:
Private sector (IBM, Facebook, Google, Twitter)
Government (FBI, NSA, DOD)
DC Area think tanks (Cato, AEI, Koch, and Brookings)
348 RSVPs confirmed, 45% front think tanks, 45% private sector.
10% Government
Most in attendance are of a Libertarian or Conservative slant
ACKNOWLEDGEMENTS: John Bolton (will be on stage to introduce you, speaking before you)
Worked on a paper with Bolton on national security in the Bush years,
before iPhones were around.
12
PERSONAL CONNECTION: Love visiting the Newseum because of 'Anchorman' exhibit
PURPOUSE OF EVENT: The Cato Institute Tech Conference is bringing together the
nation's top minds and leaders to assess key threats and developments
in cybersecurity today. The goal of the conference is to find
common connections and new ideas about the future of a safer
world with new innovations in public and private technology.
TOPICOFYOUR SPEECH: As the Senior Fellow of the Cato Institute, you are the final closing
speaker at the conference. The purpose of your speech is to defend
your stance about the top Presidential Candidate's proposal for a
partnership with social media firms and government surveillance agencies.
Your speech states that the partnership assumes that terrorism can be
prevented by increasing surveillance capabilities on social media platforms.
Your argument is that the effectiveness of such a policy is
well intentioned, but unfounded and dangerous.
You are encouraging the audience to be mindful of surveillance with
technological innovations in their work.
TOPIC AND SUBTOPICS: Your key supporting claims are:
1) Capabilities of search algorithms are overestimated with human
behavior. Cannot understand context/irony/sarcasm
2) Terrorist tweets do not automatically equal a terrorist action
Tweets will not hold up in a court of law as evidence
3) Broad surveillance for private and public messaging violates privacy
Innocent civilians suffer, free speech is stifled
SPEECH FORMAT Speech will be printed out in 20 font, proper casing.
Olivia Farrow
Speech Sample
13
Terrorist Tweets:
The Limits of Social Media Surveillance
CATO INSTITUTE'S TECH CONFRENCE 2016
I. INTRODUCTION
Good evening, everybody. It is an honor to be speaking to you today. Thank you,
Ambassador Bolton, for introducing me. Mr. Bolton and I spent a couple of long weeks on some
very wonky papers before iPhones were around. Phone tag was quite a sport back then. I would also
like to thank my coworkers at Cato for choosing the Newseum to hold this conference. I don't
know if you've seen the exhibits, but Ron Burgandy's 'Anchorman' gallery is a lot of fun. I'm going
to talk today about an idea that has been getting attention in our sectors about Secretary Clinton's
national security platform. I'm talking specifically about Hillary Clinton's proposal for a partnership
with social media firms and government surveillance agencies to fightterrorism.
While Ms. Clinton's proposal may seem like a good idea, I want you, leaders of the
intelligence and tech sectors, to have a healthy sense of skepticism and caution about the limits of
using social media surveillance to fight terrorism. I will be illustrating these limits in three ways. One,
technology is limited. Two, there are legal limits in social media. Three, the limits of free speech.
II. TECHNOLOGY ISLIMITED
Let's start off with the bitterest pill to swallow: technology is limited. Computers can do a
lot, but they still can't understand human behavior. I know it is a difficult fact for us in the tech field
to admit. We want our computers to do any and everything, why not use them for combating
terrorism? Most of you know that search algorithms on social media can shut down child
pornographers. Ms. Clinton is proposing we use the same idea for terrorism. Unfortunately, that is
like using a tourniquet for the flu. This program would heavily rely upon scientifically based values
Olivia Farrow
Speech Sample
14
From search algorithms. If these search algorithms detect dangerous activity on public and
private posts and messages, an alarm would be raised.
Sounds promising, right? Unfortunately, a search system cannot detect unique human quirks
that frequently appear in social media messages and posts, such as tone, context, or lingo. But like I
said, technology is limited. Many forget that a lot of people, let alone computers, can't understand
irony on a daily basis. Sarcasm is another common problem with even the most advanced messaging
systems. Actually, we should feel flattered to know that some quirks of the human tongue still can't
be quickly decoded on Google Translate or Facebook Messenger. Only a human can make judgment
calls like understanding a complex post. Technology is limited, and that is my first reason why we in
the tech community should be skeptical to rely on search algorithms for terrorist surveillance.
III. LEGAL LIMITS IN SOCIAL MEDIA
There are legal limits in social media. That is my second reason for why everyone in this
auditorium should be skeptical to use a tech surveillance program. We are all innocent until proven
guilty. This includes tweets and messages. You would be amazed how often extremist posts and
messages are flitted about on a regular basis. The FBI has explained multiple times that many people
release thousands of extremist posts every day. Those thousands of posts just turn into digital rot­
nothing else. No explosions, no shootings, just bad posts.
Posts cannot hold up on their own in a court of law as evidence for terrorism. Here are two
specific legal limitations. Legal limit one: the FBI can only act on an extremist post if the suspect has
sent money to a known terrorist account or left the country in the likelihood that they are receiving
terrorist training. Neither of these actions can be proven from social media posts. Legal limit two:
counterintelligence experts have explained that a search algorithm detecting suspicious posts results
15
Olivia Farrow
Speech Sample
in thousands of false alarms. Someone may foolishly post something that is detected by Silicon
Valley's systems, sirens blare, and government agents wind up inspecting a dead end.
False alarms may compromise a legitimate investigation. The FBI has explained this
limitation in the wake of several terrorist attacks, such as the events in Orlando and San Bernardino.
In both attacks, the assailants pledged allegiance to ISIS online. They were being monitored before
the attacks. However, enforcement agencies were unable to find legal grounds to arrest the person in
question. Orlando shooting trial attorney Dan Scott said it best. "Talk is cheap. There are a lot of
people who talk. But the question is whether they will act."
Now imagine that you are an investigator, some of you in the crowd are, and you are hot on
the trail of possible terrorists based on human based leads. How maddening would it be to suddenly
have your investigation mucked up because an arbitrary search system raised an alarm and took your
resources away from this case for a dead end? The legal limits of posts are why we need to be
cautious about this proposed program.
IV.THE LIMITS OF FREESPEECH
My third and final reason for why I want you, the leaders of technological innovation, to be
skeptical of Ms. Clinton's proposal, is because it limits free speech. This is normally an argument
used for high school debate class. However I want you to think about the idea of not only your
public Facebook wall being monitored, but your private messages to your friends and family being
monitored. Frankly, I think that whoever would be stuck monitoring my Facebook messages would
have the most boring job in the world. But would you be ok with everyone's privacy being
eradicated for a faulty antiterrorist surveillance program?
"When you know that your personal and public communication channels are being
monitored, you act differently. If almost all Americans are subjected to this kind of observation, you
16
Olivia Farrow
Speech Sample
can't help but assume people may limit what they say, perfectly legal things, out of concern thattheir
livelihoods may be at stake. This can limit radical, groundbreaking ideas. Keep in mind these may
not be illegal ideas or even unethical ideas. It could be a message about why you support Black Lives
Matter. It could be a message about the right to bear arms. Both can be seen as pretty extremist,
right? But theyaren't necessarily illegal.
Both Black Lives Matter and the NRA have already cited increased shadowing from both
technology firms and government agencies. What's next, the American Cancer Society? Your book
club? Most results from a program like Ms. Clinton's would result in no illegal behavior from these
groups, only burdensome false alarms. Do you think that this baseless program would really be
worth the price of limiting social change that we Americans believe in so dearly? Clearly, Secretary
Clinton's proposal is intriguing, but we need to be cautious about its limits on speech.
V. CLOSING: BE SKEPTICAL
Technology is a tool that all of us use every day. We always want it to do more, but we also
need to remember what it can't do. These limits need to be considered when approaching a social
media surveillance program like Secretary Clinton's. The three are the technological limits of human
behavior, the legal limits of social media posts, and the limits that such a program places on free
speech.
It is because of these three limits that I urge you leaders of the tech community to proceed
with skepticism and caution if someone approaches you with such a program. We need to fight
terrorism with all of the mettle and ingenuity that America's greatest minds have to offer. But to do
this, we need to have humans at the helm, not computers. Thank you for your attention, and I wish
all of you good fortune in your careers in cyber security.
Writing Sample Portfolio

More Related Content

What's hot (20)

Presentation on IMF
Presentation on IMFPresentation on IMF
Presentation on IMF
 
Presentation On Imf
Presentation On ImfPresentation On Imf
Presentation On Imf
 
International Monitory Fund (IMF) by Abdullsamad Aqil Khan
International Monitory Fund (IMF) by Abdullsamad Aqil KhanInternational Monitory Fund (IMF) by Abdullsamad Aqil Khan
International Monitory Fund (IMF) by Abdullsamad Aqil Khan
 
IMF and World bank
IMF and World bankIMF and World bank
IMF and World bank
 
The international monetary fund
The international monetary fundThe international monetary fund
The international monetary fund
 
Imf n pak
Imf n pakImf n pak
Imf n pak
 
imf
imfimf
imf
 
Imf
ImfImf
Imf
 
Imf
ImfImf
Imf
 
The International Monetary Fund
The International Monetary FundThe International Monetary Fund
The International Monetary Fund
 
The Role of IMF on the Global Monetary Systems
The Role of IMF on the Global Monetary Systems The Role of IMF on the Global Monetary Systems
The Role of IMF on the Global Monetary Systems
 
International monetary fund
International monetary fundInternational monetary fund
International monetary fund
 
IMF & Impact On India
IMF & Impact On IndiaIMF & Impact On India
IMF & Impact On India
 
International Monetary Fund
International Monetary FundInternational Monetary Fund
International Monetary Fund
 
Imf
ImfImf
Imf
 
IMF monetary fund
IMF monetary fundIMF monetary fund
IMF monetary fund
 
IMF & India: Dr. C S Shaijumon
IMF & India: Dr. C S Shaijumon IMF & India: Dr. C S Shaijumon
IMF & India: Dr. C S Shaijumon
 
International Monetary Fund
International Monetary FundInternational Monetary Fund
International Monetary Fund
 
Imf class
Imf classImf class
Imf class
 
Presentation on imf
Presentation on imfPresentation on imf
Presentation on imf
 

Similar to Writing Sample Portfolio

International Monetory fund
International Monetory fundInternational Monetory fund
International Monetory fundAmbarish Nigam
 
International economics Unit - V
International economics   Unit - VInternational economics   Unit - V
International economics Unit - VDr. Mani Madhavan
 
International monetary fund
International monetary fundInternational monetary fund
International monetary fundPankaj Rao
 
international monitory fund
international monitory fundinternational monitory fund
international monitory fundMann Saini
 
Brief note on world bank
Brief note on world bankBrief note on world bank
Brief note on world bankhirok1997
 
International Financial Institution, IMF, IBRD,IFC,IDA
International Financial Institution, IMF, IBRD,IFC,IDAInternational Financial Institution, IMF, IBRD,IFC,IDA
International Financial Institution, IMF, IBRD,IFC,IDAMohammed Jasir PV
 
International financial management for entrepreneurs
International financial management for entrepreneursInternational financial management for entrepreneurs
International financial management for entrepreneursTheivanayakiMPSGRKCW
 
World Bank & IMF (International Monetary Fund)
World Bank & IMF (International Monetary Fund)World Bank & IMF (International Monetary Fund)
World Bank & IMF (International Monetary Fund)Gaurav Jain
 
international monetary fund(IMF)
international monetary fund(IMF)international monetary fund(IMF)
international monetary fund(IMF)sundrambajaj
 
WTO & Trade Issues - International Financial Institutions.pptx
WTO & Trade Issues - International Financial Institutions.pptxWTO & Trade Issues - International Financial Institutions.pptx
WTO & Trade Issues - International Financial Institutions.pptxDiksha Vashisht
 
World bank and International Monetary Fund (imf
World bank and International Monetary Fund (imfWorld bank and International Monetary Fund (imf
World bank and International Monetary Fund (imfRyan Cloyd Villanueva
 
International Monetary Fund
International Monetary FundInternational Monetary Fund
International Monetary FundAnju Dony
 

Similar to Writing Sample Portfolio (20)

International Monetory fund
International Monetory fundInternational Monetory fund
International Monetory fund
 
International economics Unit - V
International economics   Unit - VInternational economics   Unit - V
International economics Unit - V
 
International monetary fund
International monetary fundInternational monetary fund
International monetary fund
 
international monitory fund
international monitory fundinternational monitory fund
international monitory fund
 
Pep
PepPep
Pep
 
International Monetary Fund
International Monetary FundInternational Monetary Fund
International Monetary Fund
 
1773
17731773
1773
 
1773
17731773
1773
 
Role Of Multilateral Agencies
Role Of Multilateral AgenciesRole Of Multilateral Agencies
Role Of Multilateral Agencies
 
Imf
ImfImf
Imf
 
Brief note on world bank
Brief note on world bankBrief note on world bank
Brief note on world bank
 
International Financial Institution, IMF, IBRD,IFC,IDA
International Financial Institution, IMF, IBRD,IFC,IDAInternational Financial Institution, IMF, IBRD,IFC,IDA
International Financial Institution, IMF, IBRD,IFC,IDA
 
International financial management for entrepreneurs
International financial management for entrepreneursInternational financial management for entrepreneurs
International financial management for entrepreneurs
 
Imf
ImfImf
Imf
 
World Bank & IMF (International Monetary Fund)
World Bank & IMF (International Monetary Fund)World Bank & IMF (International Monetary Fund)
World Bank & IMF (International Monetary Fund)
 
Imf ppt
Imf pptImf ppt
Imf ppt
 
international monetary fund(IMF)
international monetary fund(IMF)international monetary fund(IMF)
international monetary fund(IMF)
 
WTO & Trade Issues - International Financial Institutions.pptx
WTO & Trade Issues - International Financial Institutions.pptxWTO & Trade Issues - International Financial Institutions.pptx
WTO & Trade Issues - International Financial Institutions.pptx
 
World bank and International Monetary Fund (imf
World bank and International Monetary Fund (imfWorld bank and International Monetary Fund (imf
World bank and International Monetary Fund (imf
 
International Monetary Fund
International Monetary FundInternational Monetary Fund
International Monetary Fund
 

Recently uploaded

DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdfDGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdfDemandbase
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...aditipandeya
 
Mastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven WorldMastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven WorldScalenut
 
CALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service Onlineanilsa9823
 
Local SEO Domination: Put your business at the forefront of local searches!
Local SEO Domination:  Put your business at the forefront of local searches!Local SEO Domination:  Put your business at the forefront of local searches!
Local SEO Domination: Put your business at the forefront of local searches!dstvtechnician
 
Cost-effective tactics for navigating CPC surges
Cost-effective tactics for navigating CPC surgesCost-effective tactics for navigating CPC surges
Cost-effective tactics for navigating CPC surgesPushON Ltd
 
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...ChesterYang6
 
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...Search Engine Journal
 
2024 SEO Trends for Business Success (WSA)
2024 SEO Trends for Business Success (WSA)2024 SEO Trends for Business Success (WSA)
2024 SEO Trends for Business Success (WSA)Jomer Gregorio
 
Jai Institute for Parenting Program Guide
Jai Institute for Parenting Program GuideJai Institute for Parenting Program Guide
Jai Institute for Parenting Program Guidekiva6
 
Social Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdfSocial Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdfSocial Samosa
 
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing Strategy
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing StrategyDIGITAL MARKETING COURSE IN BTM -Influencer Marketing Strategy
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing StrategySouvikRay24
 
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...How videos can elevate your Google rankings and improve your EEAT - Benjamin ...
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...Benjamin Szturmaj
 

Recently uploaded (20)

DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdfDGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
 
Turn Digital Reputation Threats into Offense Tactics - Daniel Lemin
Turn Digital Reputation Threats into Offense Tactics - Daniel LeminTurn Digital Reputation Threats into Offense Tactics - Daniel Lemin
Turn Digital Reputation Threats into Offense Tactics - Daniel Lemin
 
Generative AI Master Class - Generative AI, Unleash Creative Opportunity - Pe...
Generative AI Master Class - Generative AI, Unleash Creative Opportunity - Pe...Generative AI Master Class - Generative AI, Unleash Creative Opportunity - Pe...
Generative AI Master Class - Generative AI, Unleash Creative Opportunity - Pe...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
 
Mastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven WorldMastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven World
 
CALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service Online
 
Local SEO Domination: Put your business at the forefront of local searches!
Local SEO Domination:  Put your business at the forefront of local searches!Local SEO Domination:  Put your business at the forefront of local searches!
Local SEO Domination: Put your business at the forefront of local searches!
 
Cost-effective tactics for navigating CPC surges
Cost-effective tactics for navigating CPC surgesCost-effective tactics for navigating CPC surges
Cost-effective tactics for navigating CPC surges
 
Creator Influencer Strategy Master Class - Corinne Rose Guirgis
Creator Influencer Strategy Master Class - Corinne Rose GuirgisCreator Influencer Strategy Master Class - Corinne Rose Guirgis
Creator Influencer Strategy Master Class - Corinne Rose Guirgis
 
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...
 
BUY GMAIL ACCOUNTS PVA USA IP INDIAN IP GMAIL
BUY GMAIL ACCOUNTS PVA USA IP INDIAN IP GMAILBUY GMAIL ACCOUNTS PVA USA IP INDIAN IP GMAIL
BUY GMAIL ACCOUNTS PVA USA IP INDIAN IP GMAIL
 
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
 
2024 SEO Trends for Business Success (WSA)
2024 SEO Trends for Business Success (WSA)2024 SEO Trends for Business Success (WSA)
2024 SEO Trends for Business Success (WSA)
 
Jai Institute for Parenting Program Guide
Jai Institute for Parenting Program GuideJai Institute for Parenting Program Guide
Jai Institute for Parenting Program Guide
 
Social Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdfSocial Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdf
 
The Future of Brands on LinkedIn - Alison Kaltman
The Future of Brands on LinkedIn - Alison KaltmanThe Future of Brands on LinkedIn - Alison Kaltman
The Future of Brands on LinkedIn - Alison Kaltman
 
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing Strategy
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing StrategyDIGITAL MARKETING COURSE IN BTM -Influencer Marketing Strategy
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing Strategy
 
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...How videos can elevate your Google rankings and improve your EEAT - Benjamin ...
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...
 
How to Create a Social Media Plan Like a Pro - Jordan Scheltgen
How to Create a Social Media Plan Like a Pro - Jordan ScheltgenHow to Create a Social Media Plan Like a Pro - Jordan Scheltgen
How to Create a Social Media Plan Like a Pro - Jordan Scheltgen
 
SEO Master Class - Steve Wiideman, Wiideman Consulting Group
SEO Master Class - Steve Wiideman, Wiideman Consulting GroupSEO Master Class - Steve Wiideman, Wiideman Consulting Group
SEO Master Class - Steve Wiideman, Wiideman Consulting Group
 

Writing Sample Portfolio

  • 1. Writing Portfolio Olivia Farrow orf2@georgetown.edu 703-505-8046 Table ofContents Press Release.................................................................................................. 1 FactSheet.........................................................................................2 Backgrounder.................................................................................................3 Q&A ................................................................................ 4 Talking Points.................................................................................. 5 Peg/Problem/Promise................................................................................6-8 Op-Ed..........................................................................................9-10 SpecSheet..................................................................................11-12 Speech..............................................................................................13-16
  • 2. Olivia Farrow Press Release Sample 1 FOR IMMEDIATE RELEASE June 7, 2016 CONTACT: OLIVIA FARROW 703-505-8046 Orf2@georgetown.edu Cooper Hospital Joins Forces with Competitors: Starts Electronic Records System Exchange to lead the state in faster healthcare CAMDEN, NJ- On June 7th, Cooper University Hospital will be joining forces with rivaling hospitals Our Lady of Lourdes Medical Center and Virtua Health to create an electronic medical records exchange. This program will synchronize three large health organizations' databases so doctors can quickly collect over 70,000 patients' medical histories. "This will really speed up a patient's visit in Camden," said Jeffrey Brenner, the doctor who initiated the Camden Coalition of Healthcare Providers. "When it's a matter of life and death, an ER nurse or doctor needs to get the whole picture. A lot of crucial data on a patient can be accessed in moments with an electronic medical record." The CDC ranks medical errors as the third highest cause of death in the United States, which equates to over 250,000 deaths in 2015. Medical errors include improper coordination of care and diagnostic errors, which an electronic medical record exchange can alleviate. "A lot of suffering and death can be prevented with this exchange," Dr. Brenner said in his office in Camden. "A doctor needs to know if the patient has a history of high blood pressure, allergens, or a history of kidney problems. If a doctor prescribes something that conflicts with a patient's medication, that is like mixing ammonia and bleach-you don't do it. With a comprehensive medical record at the ready, doctors will be able to circumvent a lot of medical errors." Currently, the United States economy spends one out of every six dollars on healthcare, including medical record infrastructure. **
  • 3. 2 Olivia Farrow Fact Sheet Sample Fact Sheet: The International Monetary Fund The IMF's Function: • Ensure the stability of exchange rates and international payments for countries and it's peoples. o Executed through providing loans and establishing financial safeguards o Providing management advice for economic projects The IMF's Resources: • Financial resources are through member quotas o Quotas reflect each members' position in the global economy The IMF at A Glance: • 189 member countries • Headquarters: Washington, D.C. • Managing Director: ChristineLagarde • Executive Board: 24 Directors representing countries or groups of countries • Staff: Approximately 2,663 from 148 countries • Total quotas: US$650 billion as of March 2016. • Additional pledged or committed resources: US $642billion • Biggest borrowers as of March 2016: Portugal, Greece, Ukraine, Ireland The IMF's Beginnings: • First proposed at the United Nations conference in Bretton Woods, New Hampshire, United States, July 1944. • Initially began with 44 governments. • Goal was to build economic infrastructures and safeguards to prevent competitive devaluations of currencies in the Great Depression of the 1930s. The IMF’s Governance: • Leadership consists of member countries' governments o Board of Governors consists of one Governor and one Alternate Governor from each member country
  • 4. 3 Olivia Farrow Background Sample Background: The International Monetary Fund History: The IMF, also known as the Fund, was first proposed at the United Nations conference in Bretton Woods, New Hampshire, United States, July 1944. The 44 governments represented at that conference sought to build a framework for economic cooperation to avoid a repetition of the vicious circle of currency fluctuations that contributed to the Great Depression of the 1930s. Function: The Fund's primary function is to provide loans and economic safeguards to countries in economic duress. Such functions are executed through providing loans and establishing financial accountability in the world economy. These functions are further carried out through providing technical assistance to ensure IMF funded programs improve living standards and economic stability. The IMF's Resources: The Fund's financial resources are through member countries' contributions. Quotas reflect each members' position in the global economy. The current total quotas as of March 2016 are US $650 billion US dollars. The Fund has an additional pledged or committed resources of 642 billion US dollars. The IMF’s Governance: The Fund's leadership consists of member countries' governments, specifically through its Board of Governors. The Fund's Board of Governors consists of one Governor and one Alternate Governor from each member country. There are now 24 Directors representing countries or groups of countries as of June 2016. The IMF Today: The Fund now has 189 member countries. Headquartered in Washington, DC, the Fund has approximately 2663 employees from 148 countries. The Fund's most notable project to date has been the bailout of the country of Greece to the sum of 110 billion Euros in 2010 and an additional 100 billion Euros in 2011. The Funds' biggest borrowers as of March 2016 are Portugal, Greece, Ukraine, and Ireland.
  • 5. 4 Olivia Farrow Q&A Sample Q&A: The International Monetary Fund Q: What does the IMF do? A: The International Monetary Fund, or the Fund, ensures the stability of exchange rates and international payments for countries and it's peoples. These goals are executed through providing loans and establishing financial safeguards to its' member nations. The Fund also provides economic analysis on the global economy. Q: When and where was the IMF founded? A: The Fund was organized at the United Nations conference in Bretton Woods, New Hampshire, United States, July 1944. Q: Wby was the IMF founded? A: The founding members of the Fund sought to build a framework for economic cooperation to avoid a repetition of the vicious circle of competitive devaluations that contributed to the Great Depression of the 1930s. Q: How does the IMF get its' funding? A: The Fund's financial resources are through member countries' contributions. Quotas reflect each members' position in the global economy. Q: How many countries have membership with the IMF? A: The Fund has 189 member countries. Q: How much money does the IMF have in quotas? A: The current total quotas as of 3/9/16 are US $650 billion. The Fund has an additional pledged or committed resources of US $642 billion. Q: What is a notable project that the IMF has undergone recently? A: The Fund's most notable project to date has been the bailout of the country of Greece to the sum of 110 billion Euros in 2010 and an additional 100 billion Euros in 2011. Q: Where can I learn more about the IMF? A: For more information please visit www.imf.org.
  • 6. 5 Olivia Farrow Talking PointsSample Talking Points: The International Monetary Fund Overview: • The IMF's Function: o Ensure the stability of exchange rates and international payments for countries o Executed through providing loans and establishing financialsafeguards o Goal was to build economic infrastructures and safeguards to prevent competitive devaluations of currencies in the Great Depression of the 1930s. The IMF At A Glance: • 189 member countries • Headquarters: Washington, D.C. • Executive Board: 24 Directors representing countries or groups of countries • Managing Director: ChristineLagarde • Staff: Approximately 2,663 from 148 countries • Total quotas: US$650 billion (as of 3/9/16) • Additional pledged or committed resources: US $642 billion • Biggest borrowers (as of 2/29/16):Portugal, Greece, Ukraine, Ireland The IMF's Resources: • Financial resources are through member quotas o Quotas reflect each members' position in the global economy The IMF's Governance: • Leadership consists of member countries' governments o Board of Governors consists of one Governor and one Alternate Governor from each member country Timeline: July 1944: First proposed at the United Nations conference in New Hampshire. March 1947: The Fund begins operations. May 1947: First drawing from the Fund by France. May 1976: The Fund decides on policies and procedures for selling gold. May 1992: The Fund approves membership of countries of the former Soviet Union. October 2008: The Fund offers $100 billion to countries harmed by the financial crises 2010-2011: The Fund loans the country of Greece 110 billion Euros and an additional 100 billion Euros in 2011. October 2016: Chinese renminbi added to list of world currencies on reserve
  • 7. 6 Olivia Farrow Peg/Problem/PromiseSample Topic: Contributory Negligence Bill Pro: Peg: On Tuesday, the DC City Council decided to postpone their vote on providing crash victims compensation in collisions. Problem: The current law in DC for pedestrians and cyclists is that if they are found even slightly responsible for a collision with a car, they cannot receive any compensation. Promise: DC City Council should pass the proposed bill that would provide compensation to pedestrians and cyclists who are harmed in crashes. Con: Peg: On Tuesday, the DC City Council decided to postpone their vote on providing crash victims compensation in collisions. Problem: If DC City Council passes the proposed bill, auto insurance rates for DC drivers will increase an additional 600 dollars a year. Promise: Though the proposed bill seems like a good idea, it would cost DC drivers exorbitant amounts of money for a small number of crashes. Topic: Banning Fashion Ads Pro: Peg: This month, London Mayor Sadiq Khan announced that London transportation would no longer run ads featuring unrealistically skinny women. Problem: Ads that promote women who are dangerously thin is demeaning to women and makes them ashamed of their bodies. Promise: London's new ban of these kinds of ads will encourage responsible advertising that is respectful to women of all shapes and sizes. Con: Peg: This month, London Mayor Sadiq Khan announced that London transportation would no longer run ads featuring unrealistically skinny women. Problem: Banning ads featuring women who are thin is still encouraging people to judge women based on the size of their bodies, no matter how large or small they are. Promise: Public transportation in London should not try to censor ads with skinny women because society will still judge women because of their sizes anyway, even if it is not in public transportation.
  • 8. 7 Olivia Farrow Peg/Problem/PromiseSample Topic: The Problems with Vocal Fry Pro: Peg: Many women in their 20s and 30s have developed a speaking pattern called 'vocal fry,' in which the speaker uses long sentences and a guttural, soft spoken voice. Problem: Women should be mindful of avoiding vocal fry if they are to move up in the workplace, as this pattern of speech can be a barrier to advancement because of their apparent lack of professionalism. Promise: If women stop using vocal fry, they will be respected by their elders and advance in the workplace. Con: Peg: Many women in their 20s and 30s have developed a speaking pattern called 'vocal fry,' in which the speaker uses long sentences and a guttural, soft spoken voice. Problem: Vocal fry is not a problem with the young women using this speech pattern: it is a symptom of misogynistic standards that find fault with women no matter how they speak. Promise: Vocal fry is not a symptom of unprofessional young women in the workplace, but a sign that culture is policing young women's voices. Topic: Federal Election Commission charging Fox News for Republican Primary Debates Pro: Peg: The Federal Election Commission's Democratic Commissioners voted last week to pursue legal action against Fox News, charging that the network unfairly excluded candidates from participating in the Republican Primary Debates. Problem: Candidate Mark Everson was unjustly blocked from debating because Fox News did not follow objective selection criteria set up by FEC regulations. Promise: The Democratic Commissioners are in the right to charge Fox News with failing to follow FEC political debate laws, as Mark Everson met the criteria to be eligible to be in the Republican Primary Debates but was still not allowed to participate. Con: Peg: The Federal Election Commission's Democratic Commissioners voted last week to pursue legal action against Fox News, charging that the network unfairly excluded candidates from participating in the Republican Primary Debates.
  • 9. Olivia Farrow Peg/Problem/PromiseSample 8 Problem: Under the FEC regulations, Fox News was left with very little room to differentiate candidates and had to make executive calls about who would and would not be eligible to debate. Promise: Fox News had to make due with the difficult situation in an overcrowded candidate field and used their right under the First Amendment of freedom of the press to not invite Mark Everson in the GOP primary debates. Topic: Montgomery Study on Plastic Bag Tax Pro: Peg: Last week, Montgomery, Maryland released their findings of a study of the impacts of a tax on plastic bags that is now four years old. Problem: The recent study shows that the plastic bag tax has reduced plastic bag sales in convenience stores and department stores, reducing trash and waste that would otherwise pollute the Anacostia River. Promise: Montgomery's study on plastic bag taxes proves that such programs are effective for improving the environment in Maryland. Con: Peg: Last week, Montgomery, Maryland released their findings of a study of the impacts of a tax on plastic bags that is now four years old. Problem: The results of the study found that while plastic bag sales have dropped in convenience stores and department stores, plastic bag sales have increased 3.2 percent in grocery stores since the tax began. Promise: Montgomery's study on plastic bag taxes proves that unless there is an outright ban on plastic bags, people will continue to use environmentally harmful plastic bags.
  • 10. 9 Olivia Farrow Op-Ed Sample h Preventing terrorism requires people, not search algorithms In response to recent terrorist attacks, on June 15, Hillary Clinton reinvigorated her proposal for a partnership with social media firms and government surveillance agencies. This partnership assumes that terrorism can be prevented by increasing surveillance capabilities on social media platforms. While Ms. Clinton’s proposal may seem like a good idea, the effectiveness of such a policy is unfounded and dangerous. The capabilities of search algorithms are greatly overestimated, especially when trying to understand human behavior. Ms. Clinton's proposed surveillance program would heavily rely upon scientifically derived values from computer systems belonging to companies like Facebook and Twitter. From these search systems, a risk score, similar to a credit score, would be assigned to suspicious users. If a scan from these search algorithms detected dangerous activity on public and private posts and messages, an alarm would be raised. Search algorithm results can only be programmed as well as the person who designed it. Silicon Valley engineers are not antiterrorist experts, so the scope of what algorithms can do for finding terrorist activity online is limited. A search system cannot detect unique human quirks that frequently appear in social media messages and posts, such as tone, context, or lingo. Despite recent developments in technology, only a human can make judgment calls like understanding a sarcastic post. Twitter has also stated that there are still technological limitations in detecting videos and photos. The product of a counterterrorist program that relies on erratic methods like Ms. Clinton's will lead to bad enforcement. In the world of online media and extremism, talk is cheap. Many people release thousands of extremist posts every day, but none of them will turn into an actual act. The FBI has explained this conundrum in the wake of several terrorist attacks, such as the events in Orlando and San Bernardino. In both incidents, the assailants pledged allegiance to ISIS online and were being monitored before the attacks. However, enforcement agencies were unable to find legal grounds to arrest the person in question. This is because while the suspect posted suspicious material, they did not actually do anything related to terrorism. The FBI can only act on an extremist post if the suspect has sent money to a known terrorist account or left the country in the likelihood that they are receiving terrorist training. Neither of these actions can be proven from social media posts. Additionally, counterintelligence experts have explained that a search algorithm detecting suspicious posts results in thousands of false alarms. Someone may foolishly post something that is detected by
  • 11. Olivia Farrow Op-Ed Sample 10 Silicon Valley's systems, sirens blare, and government agents wind up inspecting a dead end. False alarms may compromise a legitimate investigation. These distractions cost an incredible amount of taxpayer funded resources, which can be better spent on substantiated leads generated from humans, not machines. A government that has a blanket approach on surveillance for both public and private social media messages violates its citizens' right to privacy and free speech. Every private Facebook message or offline Tweet could be subject to government scrutiny under Ms. Clinton's proposal. These freedoms are compromised to not only those who sympathize with extremists, but innocent Americans as well. When Americans know that all communication channels are being monitored, whether it is private or public, Americans involuntarily act differently. Massive surveillance without due process can stifle legally protected social change. Extremism does not automatically mean illegal acts are at hand. Black Lives Matter organizers and NRA campaigners are seen as extremists to the government as well. Both of these groups have already cited increased shadowing from both technology firms and government agencies. Government-led surveillance operations have been used on Martin Luther King Jr., a fact that still haunts the FBI today. Most results from a program like Ms. Clinton's would result in no illegal behavior from these groups, only burdensome falsealarms. It is comforting to assume terrorism could be prevented by a simple computer program like Ms. Clinton's. Unfortunately, the effectiveness of such a policy is unproven and dangerous. This has been proven from both the private and government sectors citing the limitations of technology's ability to understand human behavior. Relying on such search algorithms will result in costly false alarms that can jeopardize investigations. The threat of denying all Americans, specifically innocent citizens, from privacy and free speech is even more ominous in such a surveillance policy. While computers are incredibly powerful, they still cannot deter a terrorist.
  • 12. 11 SPEECH SPEC SHEET Olivia Farrow Spec Sheet Sample 1 JIM HARPER, CATO INSTITUTE TECH CONFRENCE SPEAKER: DATE: Jim Harper, Senior Fellow, Cato Institute Wednesday, August 10, 2016 EVENT START/END TIME: 10:00 AM- 11:30 AM SPEECH TIME: SPEAKER BEFOREYOU: LOCATION: 10:50 AM to 11:00 AM. 10 Minutes HARD STOP. John Bolton, Former UN Ambassador 10:30-10:45 AM 555 Pennsylvania Ave NW, Washington, DC 20001 Annenberg Theater, 7th Floor Use the 6th Street entrance on the left side of the building. LOCATION: Enter at Level 1 Elevators are the first thing you will see after security. Large bags and backpacks are prohibited. STAGE SETUP: Elevated platform (two steps elevated) Podium is set up on the front patio of the store the podium will be Stage Right SIZE: 170 feet long, 55 feet wide, 90 feet high 450 seats, 348 RSVPs confirmed AUDIENCE: Leaders and researchers in: Private sector (IBM, Facebook, Google, Twitter) Government (FBI, NSA, DOD) DC Area think tanks (Cato, AEI, Koch, and Brookings) 348 RSVPs confirmed, 45% front think tanks, 45% private sector. 10% Government Most in attendance are of a Libertarian or Conservative slant ACKNOWLEDGEMENTS: John Bolton (will be on stage to introduce you, speaking before you) Worked on a paper with Bolton on national security in the Bush years, before iPhones were around.
  • 13. 12 PERSONAL CONNECTION: Love visiting the Newseum because of 'Anchorman' exhibit PURPOUSE OF EVENT: The Cato Institute Tech Conference is bringing together the nation's top minds and leaders to assess key threats and developments in cybersecurity today. The goal of the conference is to find common connections and new ideas about the future of a safer world with new innovations in public and private technology. TOPICOFYOUR SPEECH: As the Senior Fellow of the Cato Institute, you are the final closing speaker at the conference. The purpose of your speech is to defend your stance about the top Presidential Candidate's proposal for a partnership with social media firms and government surveillance agencies. Your speech states that the partnership assumes that terrorism can be prevented by increasing surveillance capabilities on social media platforms. Your argument is that the effectiveness of such a policy is well intentioned, but unfounded and dangerous. You are encouraging the audience to be mindful of surveillance with technological innovations in their work. TOPIC AND SUBTOPICS: Your key supporting claims are: 1) Capabilities of search algorithms are overestimated with human behavior. Cannot understand context/irony/sarcasm 2) Terrorist tweets do not automatically equal a terrorist action Tweets will not hold up in a court of law as evidence 3) Broad surveillance for private and public messaging violates privacy Innocent civilians suffer, free speech is stifled SPEECH FORMAT Speech will be printed out in 20 font, proper casing.
  • 14. Olivia Farrow Speech Sample 13 Terrorist Tweets: The Limits of Social Media Surveillance CATO INSTITUTE'S TECH CONFRENCE 2016 I. INTRODUCTION Good evening, everybody. It is an honor to be speaking to you today. Thank you, Ambassador Bolton, for introducing me. Mr. Bolton and I spent a couple of long weeks on some very wonky papers before iPhones were around. Phone tag was quite a sport back then. I would also like to thank my coworkers at Cato for choosing the Newseum to hold this conference. I don't know if you've seen the exhibits, but Ron Burgandy's 'Anchorman' gallery is a lot of fun. I'm going to talk today about an idea that has been getting attention in our sectors about Secretary Clinton's national security platform. I'm talking specifically about Hillary Clinton's proposal for a partnership with social media firms and government surveillance agencies to fightterrorism. While Ms. Clinton's proposal may seem like a good idea, I want you, leaders of the intelligence and tech sectors, to have a healthy sense of skepticism and caution about the limits of using social media surveillance to fight terrorism. I will be illustrating these limits in three ways. One, technology is limited. Two, there are legal limits in social media. Three, the limits of free speech. II. TECHNOLOGY ISLIMITED Let's start off with the bitterest pill to swallow: technology is limited. Computers can do a lot, but they still can't understand human behavior. I know it is a difficult fact for us in the tech field to admit. We want our computers to do any and everything, why not use them for combating terrorism? Most of you know that search algorithms on social media can shut down child pornographers. Ms. Clinton is proposing we use the same idea for terrorism. Unfortunately, that is like using a tourniquet for the flu. This program would heavily rely upon scientifically based values
  • 15. Olivia Farrow Speech Sample 14 From search algorithms. If these search algorithms detect dangerous activity on public and private posts and messages, an alarm would be raised. Sounds promising, right? Unfortunately, a search system cannot detect unique human quirks that frequently appear in social media messages and posts, such as tone, context, or lingo. But like I said, technology is limited. Many forget that a lot of people, let alone computers, can't understand irony on a daily basis. Sarcasm is another common problem with even the most advanced messaging systems. Actually, we should feel flattered to know that some quirks of the human tongue still can't be quickly decoded on Google Translate or Facebook Messenger. Only a human can make judgment calls like understanding a complex post. Technology is limited, and that is my first reason why we in the tech community should be skeptical to rely on search algorithms for terrorist surveillance. III. LEGAL LIMITS IN SOCIAL MEDIA There are legal limits in social media. That is my second reason for why everyone in this auditorium should be skeptical to use a tech surveillance program. We are all innocent until proven guilty. This includes tweets and messages. You would be amazed how often extremist posts and messages are flitted about on a regular basis. The FBI has explained multiple times that many people release thousands of extremist posts every day. Those thousands of posts just turn into digital rot­ nothing else. No explosions, no shootings, just bad posts. Posts cannot hold up on their own in a court of law as evidence for terrorism. Here are two specific legal limitations. Legal limit one: the FBI can only act on an extremist post if the suspect has sent money to a known terrorist account or left the country in the likelihood that they are receiving terrorist training. Neither of these actions can be proven from social media posts. Legal limit two: counterintelligence experts have explained that a search algorithm detecting suspicious posts results
  • 16. 15 Olivia Farrow Speech Sample in thousands of false alarms. Someone may foolishly post something that is detected by Silicon Valley's systems, sirens blare, and government agents wind up inspecting a dead end. False alarms may compromise a legitimate investigation. The FBI has explained this limitation in the wake of several terrorist attacks, such as the events in Orlando and San Bernardino. In both attacks, the assailants pledged allegiance to ISIS online. They were being monitored before the attacks. However, enforcement agencies were unable to find legal grounds to arrest the person in question. Orlando shooting trial attorney Dan Scott said it best. "Talk is cheap. There are a lot of people who talk. But the question is whether they will act." Now imagine that you are an investigator, some of you in the crowd are, and you are hot on the trail of possible terrorists based on human based leads. How maddening would it be to suddenly have your investigation mucked up because an arbitrary search system raised an alarm and took your resources away from this case for a dead end? The legal limits of posts are why we need to be cautious about this proposed program. IV.THE LIMITS OF FREESPEECH My third and final reason for why I want you, the leaders of technological innovation, to be skeptical of Ms. Clinton's proposal, is because it limits free speech. This is normally an argument used for high school debate class. However I want you to think about the idea of not only your public Facebook wall being monitored, but your private messages to your friends and family being monitored. Frankly, I think that whoever would be stuck monitoring my Facebook messages would have the most boring job in the world. But would you be ok with everyone's privacy being eradicated for a faulty antiterrorist surveillance program? "When you know that your personal and public communication channels are being monitored, you act differently. If almost all Americans are subjected to this kind of observation, you
  • 17. 16 Olivia Farrow Speech Sample can't help but assume people may limit what they say, perfectly legal things, out of concern thattheir livelihoods may be at stake. This can limit radical, groundbreaking ideas. Keep in mind these may not be illegal ideas or even unethical ideas. It could be a message about why you support Black Lives Matter. It could be a message about the right to bear arms. Both can be seen as pretty extremist, right? But theyaren't necessarily illegal. Both Black Lives Matter and the NRA have already cited increased shadowing from both technology firms and government agencies. What's next, the American Cancer Society? Your book club? Most results from a program like Ms. Clinton's would result in no illegal behavior from these groups, only burdensome false alarms. Do you think that this baseless program would really be worth the price of limiting social change that we Americans believe in so dearly? Clearly, Secretary Clinton's proposal is intriguing, but we need to be cautious about its limits on speech. V. CLOSING: BE SKEPTICAL Technology is a tool that all of us use every day. We always want it to do more, but we also need to remember what it can't do. These limits need to be considered when approaching a social media surveillance program like Secretary Clinton's. The three are the technological limits of human behavior, the legal limits of social media posts, and the limits that such a program places on free speech. It is because of these three limits that I urge you leaders of the tech community to proceed with skepticism and caution if someone approaches you with such a program. We need to fight terrorism with all of the mettle and ingenuity that America's greatest minds have to offer. But to do this, we need to have humans at the helm, not computers. Thank you for your attention, and I wish all of you good fortune in your careers in cyber security.