Skip to main content

Home/ Politically Minded/ Group items tagged Activism

Rss Feed Group items tagged

thinkahol *

The joys of repressed voyeuristic titillation - Glenn Greenwald - Salon.com - 0 views

  • What makes the Anthony Weiner story somewhat unique and thus worth discussing for a moment is that, as Hendrik Hertzberg points out, the pretense of substantive relevance (which, lame though it was in prior scandals, was at least maintained) has been more or less brazenly dispensed with here.  This isn't a case of illegal sex activity or gross hypocrisy (i.e., David Vitter, Larry Craig, Mark Foley (who built their careers on Family Values) or Eliot Spitzer (who viciously prosecuted trivial prostitution cases)).  There's no lying under oath (Clinton) or allegedly illegal payments (Ensign, Edwards).  From what is known, none of the women claim harassment and Weiner didn't even have actual sex with any of them.  This is just pure mucking around in the private, consensual, unquestionably legal private sexual affairs of someone for partisan gain, voyeuristic fun and the soothing fulfillment of judgmental condemnation.  And in that regard, it sets a new standard: the private sexual activities of public figures -- down to the most intimate details -- are now inherently newsworthy, without the need for any pretense of other relevance.
  •  
    What makes the Anthony Weiner story somewhat unique and thus worth discussing for a moment is that, as Hendrik Hertzberg points out, the pretense of substantive relevance (which, lame though it was in prior scandals, was at least maintained) has been more or less brazenly dispensed with here.  This isn't a case of illegal sex activity or gross hypocrisy (i.e., David Vitter, Larry Craig, Mark Foley (who built their careers on Family Values) or Eliot Spitzer (who viciously prosecuted trivial prostitution cases)).  There's no lying under oath (Clinton) or allegedly illegal payments (Ensign, Edwards).  From what is known, none of the women claim harassment and Weiner didn't even have actual sex with any of them.  This is just pure mucking around in the private, consensual, unquestionably legal private sexual affairs of someone for partisan gain, voyeuristic fun and the soothing fulfillment of judgmental condemnation.  And in that regard, it sets a new standard: the private sexual activities of public figures -- down to the most intimate details -- are now inherently newsworthy, without the need for any pretense of other relevance. 
Ian Schlom

A Call To Oakland's Non-Violent Movement: We Must Lead By Example - 0 views

  •  
    This article is talking about how the non-violent activists in the Oakland Occupy movement should've been more active in the beginning and should be more active now, not simply tearing eachother down about thorwing a can at a poliveman who shoots people, but making an example of non-violent resistance (and since it's in an Anarchist paper, I hope non-violent revolution). "Those who would condemn the actions of activist's violent responses to police brutality must show by example what a powerful non-violent response would look like. We must be there, on the front line, willing to sit down and refuse to move when tear gas, rubber bullets, and concussion grenades are going off all around us and injuring us. That is when the courage of our conviction to non-violence is tested and proven. That is when we prove the power of non-violence to oppose injustice. Until we, the advocates of a non-violent response, can show the power of our convictions through our actions, we have no room to condemn violent protesters, especially when we do so while not also condemning the violent actions of the police in the same breath...."
Skeptical Debunker

Leaked intelligence documents: Here's what Facebook and Comcast will tell the police ab... - 0 views

  • The "Facebook Subpoena/Search Warrant Guidelines" from the Cryptome site are dated 2008, so there's a chance they've been superseded. The document spells out how law enforcement and intelligence agenices should go about requesting information about Facebook users, and details what information is turned over. Following is what Facebook will turn over about you, taken verbatim from the guide: Types of Information Available User Neoprint The Neoprint is an expanded view of a given user profile. A request should specify that they are requesting a “Neoprint of used Id XXXXXX”. User Photoprint The Photoprint is a compilation of all photos uploaded by the user that have not been deleted, along with all photos uploaded by any user which have the requested user tagged in them. A request should specify that they are requesting a “Photoprint of user Id XXXXXX”. User Contact Info All user contact information input by the user and not subsequently deleted by the user is available, regardless of whether it is visible in their profile. This information may include the following: Name Birth date Contact e-mail address(s) Physical address City State Zip Phone Cell Work phone Screen name (usually for AOL Messenger/iChat) Website With the exception of contact e-mail and activated mobile numbers, Facebook validates none of this information. A request should specify that they are requesting "Contact information of user specified by [some other piece of contact information]". No historical data is retained. Group Contact Info Where a group is known, we will provide a list of users currently registered in a group. We will also provide a PDF of the current status of the group profile page. A request should specify that they are requesting "Contact information for group XXXXXX". No historical data is retained. IP Logs IP logs can be produced for a given user ID or IP address. A request should specify that they are requesting the "IP log of user Id XXXXXX" or "IP log of IP address xxx.xxx.xxx.xxx". The log contains the following information: * Script – script executed. For instance, a profile view of the URL http://www.facebook.com/profile.php?id=29445421 would populate script with "profile.php" * Scriptget – additional information passed to the script. In the above example, scriptget would contain "id=29445421" * Userid – The Facebook user id of the account active for the request * View time – date of execution in Pacific Time * IP – source IP address IP log data is generally retained for 90 days from present date. However, this data source is under active and major redevelopment and data may be retained for a longer or shorter period. Special Requests The Facebook Security Team may be able to retrieve specific information not addressed in the general categories above. Please contact Facebook if you have a specific investigative need prior to issuing a subpoena or warrant.
  • Comcast The Comcast document is labeled "Comcast Cable Law Enforcement Handbook," and is dated 2007, so there's a possibility that it, too, has been superseded. As with the other documents, it explains how law enforcement agenices can get information, and details what information is available. There's a great deal of detail in the 35-page document, which describes what Internet, phone, and television information will be turned over. For example, here's the IP information it will make available: Comcast currently maintains Internet Protocol address log files for a period of 180 days. If Comcast is asked to respond for information relating to an incident that occurred beyond this period, we will not have responsive information and can not fulfill a legal request. (Comcast can process and respond to preservation requests as outlined below in this Handbook.) As expected, Comcast will also turn over the emails, including attachments, of those who use Comcast's email service, but "In cases involving another entity’s email service or account, Comcast would not have any access to or ability to access customer email in response to a legal request." Information Comcast turns over to law enforcement agencies varies according to the request. For example, a grand jury subpoena will yield more information than a judicial summons, as you can see in the excerpt below. Comcast notes, though, that this is just a sample, and that "Each request is evaluated and reviewed on a case by case basis in light of any special procedural or legal requirements and applicable laws." So the examples "are for illustration only."
  • For those who worry about privacy, though, all of this information is small potatoes. The real worry is about the use of what are called pen registers or trap-and-trace devices, which essentially capture all of your Internet activity --- the Web sites you visits, the emails you send and receive, IM traffic, downloads, and so on. Here's what the document says about them: Pen Register / Trap and Trace Device Title 18 U.S.C. § 3123 provides a mechanism for authorizing and approving the installation and use of a pen register or a trap and trace device pursuant to court order. All orders must be coordinated prior to submission to Comcast. Law enforcement will be asked to agree to reimburse Comcast's reasonable costs incurred to purchase and/or install and monitor necessary equipment. See "Reimbursement," below.
  • ...2 more annotations...
  • As for your voice calls made via Comcast, here's what the company will turn over: Call Detail Records - Comcast maintains two years of historical call detail records (records of local and long distance connections) for our Comcast Digital Voice telephone service. This includes local, local toll, and long distance records. Comcast also currently provides traditional circuit-switched telephone service branded Comcast Digital Phone. Call detail records for this service are collected by AT&T and are available for approximately two years as well. To determine which type of service is involved, contact the Legal Demands Center—Voice and Video at 800-871-6298. Account Records - Account records are generally stored for approximately two years after the termination of an account. If the account has an outstanding balance due, records may be retained for a longer period of time. As with Internet information, what phone information will be turned over depends on the specific kind of legal request, and the examples "are for information only." Here's an excerpt:
  • And, as you would expect, there is the same pen register/trap-and-trace device language as in the section about the Internet. Oddly enough, it appears that when it comes to information about your television viewing habits, you have more privacy rights than you do when it comes to information about your Internet and voice use, because it can only be turned over in response to a court order, not a subpoena. Here's what the document has to say about TV information: Subscriber Account Identification and Related Records For subscribers to our cable television service, the Cable Act requires Comcast as a cable operator to disclose personally identifiable information to a governmental entity solely in response to a court order (and not, for example, a subpoena) or with the subscriber's express written consent. The Cable Act requires that the cable subscriber be afforded the opportunity to appear and contest in a court proceeding relevant to the court order any claims made in support of the court order. At the proceeding, the Cable Act requires the governmental entity to offer clear and convincing evidence that the subject of the information is reasonably suspected of engaging in criminal activity and that the information sought would be material evidence in the case. See 47 U.S.C. § 551(h). Why does the law give you more privacy protection over your television viewing habits than your Internet or phone use? I haven't a clue --- ask your congressman.
  •  
    Wonder what information Facebook and Comcast will turn over to police and intelligence agencies about you? Cryptome, the site that last week posted the leaked Microsoft "spy" manual, has posted company documents that purport to describe what those companies will reveal about you. As with the Microsoft document, the information is eye-opening.
thinkahol *

The Yes Men Present: The Yes Lab for Creative Activism by The Yes Lab - Kickstarter - 0 views

  •  
    ABOUT THIS PROJECT For years, the Yes Men have been tinkering with side-splitting mischief as a way to fight injustice. Our latest film about those efforts, The Yes Men Fix the World, won lots of awards and was released all over the planet... but it simply did not fix the world.  So a year ago, we decided that showing what we do wasn't enough: we needed to help people to actually do it themselves. We called our idea The Yes Lab for Creative Activism. It's a factory for meaningful mischief, and a system for helping organizations and individuals carry out Yes Men-style actions on their own, to get media attention for important issues. But the Yes Lab is more than that: it also aims to help YOU take action on issues of social importance. Today, after a year of testing and nearly a dozen successes, we're proud to announce that the Yes Lab is ready for prime time! It's got a set of cool tools in development, that will soon help YOU get involved in new Yes Lab projects, and even to launch them. And it's got a new home at NYU, with space, lots of eager participants, and an ambitious new structure that will soon be cranking out many new projects. The trouble is that in spite of all that, we still have zero budget for the first round of projects themselves! And that's why you're reading this now. We're asking for $10,000, to make the all-new Yes Lab the lean, mean, change-making machine it can be. Any amount raised over $10,000 will bankroll projects beyond the first round.
Muslim Academy

What is Terrorism - 0 views

  •  
    What is Terrorism Terrorism is the use of force and threats against individual people, groups, or governments, for political or other various purposes. Terrorism is not a modern activity. Hundreds of years ago, societies were not as organized as they are today with modern facilities like roads, telephone, regular police forces. Back then, heads of strong groups of people such robbers, and warriors made use of force and threats to life and property to achieve their aims. Now, terrorism itself is quite an organized activity. There are terrorist organizations and societies which train terrorists for their purposes. Sometimes these organizations are supported by foreign governments with huge funds and modern weapons.
thinkahol *

Pew Opposes House Bill to Open Wyoming-Size Landscape to Development - Pew Environment ... - 0 views

  •  
    "This legislation would undo decades of public land protections by opening up an area the size of Wyoming to new industrial activity. It would allow some of the country's most pristine and spectacular landscapes to be exploited, including the vast majority of undisturbed national forests. "Mining, logging and drilling are already permitted in more than half of our national forests and other public lands. This bill would open the door to such activity on most of the rest. As a result, valuable fish and wildlife could be lost and clean drinking water for millions of Americans compromised. "This legislation would undo the nation's tradition of managing these lands with a balanced approach. It would also disregard years of work by lawmakers from both parties to craft proposals with diverse stakeholders to safeguard these undeveloped areas. In addition, the bill would eliminate interim protections on wild places that people use and enjoy. We urge Members of Congress to oppose H.R. 1581."
Arabica Robusta

Building a civil economy | openDemocracy - 6 views

  • my argument is that humans are more relational, ‘gift-exchanging animals’ who are naturally disposed to cooperate for mutual benefit. In the following I will attempt to show how such an alternative anthropology can translate into a ‘civil economy’ and transformative policy ideas: rebuilding our economy and embedding welfare in communities.
  • In the wake of Marcel Mauss’ work on the gift, this model emerged as a legitimate way of rethinking economics: humans are naturally social animals with dispositions to cooperate in the quest for the common good in which all can partake.
  • Building on Polanyi and G. D. H. Cole’s guild socialism, one can suggest that an embedded model means that elected governments have the duty to create the civic space in which workers, businesses and communities can regulate economic activity and direct the ‘free flow’ of globally mobile capital to productive activities that benefit the many, not the few.
  • ...3 more annotations...
  • At national and supranational levels, caps on interest rates would help curb the predations of creditors upon debtors. Linked to such limits on financial domination are new incentives and rewards for channelling capital in productive, human and social activities.
  • f the declared aim is to preserve the dignity of natural and human life, then all participants in the public realm have a duty to promote human relationships and associations that nurture the social bonds of trust and reciprocal help upon which both democracy and the economy rely.
  • Thus, the link between different actors and levels is a series of abstract, formal rights and entitlements or monetised, market relations (or again both at once). As such, welfare beneficiaries are reduced to merely passive recipients of a ‘one-size-fits-all’, top-down service. State paternalism and private contract delivery cost more to deliver less, and they lock people either into demoralising dependency on the central state or financially unaffordable dependency on outsourced, private contractors.
Skeptical Debunker

The Comprehensive National Cybersecurity Initiative | The White House - 0 views

  • The CNCI consists of a number of mutually reinforcing initiatives with the following major goals designed to help secure the United States in cyberspace: To establish a front line of defense against today’s immediate threats by creating or enhancing shared situational awareness of network vulnerabilities, threats, and events within the Federal Government—and ultimately with state, local, and tribal governments and private sector partners—and the ability to act quickly to reduce our current vulnerabilities and prevent intrusions. To defend against the full spectrum of threats by enhancing U.S. counterintelligence capabilities and increasing the security of the supply chain for key information technologies. To strengthen the future cybersecurity environment by expanding cyber education; coordinating and redirecting research and development efforts across the Federal Government; and working to define and develop strategies to deter hostile or malicious activity in cyberspace.
  •  
    President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we as a government or as a country are not adequately prepared to counter. Shortly after taking office, the President therefore ordered a thorough review of federal efforts to defend the U.S. information and communications infrastructure and the development of a comprehensive approach to securing America's digital infrastructure. In May 2009, the President accepted the recommendations of the resulting Cyberspace Policy Review, including the selection of an Executive Branch Cybersecurity Coordinator who will have regular access to the President. The Executive Branch was also directed to work closely with all key players in U.S. cybersecurity, including state and local governments and the private sector, to ensure an organized and unified response to future cyber incidents; strengthen public/private partnerships to find technology solutions that ensure U.S. security and prosperity; invest in the cutting-edge research and development necessary for the innovation and discovery to meet the digital challenges of our time; and begin a campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms and begin to build the digital workforce of the 21st century. Finally, the President directed that these activities be conducted in a way that is consistent with ensuring the privacy rights and civil liberties guaranteed in the Constitution and cherished by all Americans.
Skeptical Debunker

Unintended Consequences: Twelve Years under the DMCA | Electronic Frontier Foundation - 0 views

  • The DMCA Chills Free Expression and Scientific Research. Experience with section 1201 demonstrates that it is being used to stifle free speech and scientific research. The lawsuit against 2600 magazine, threats against Princeton Professor Edward Felten's team of researchers, and prosecution of Russian programmer Dmitry Sklyarov have chilled the legitimate activities of journalists, publishers, scientists, students, programmers, and members of the public. The DMCA Jeopardizes Fair Use. By banning all acts of circumvention, and all technologies and tools that can be used for circumvention, the DMCA grants to copyright owners the power to unilaterally eliminate the public's fair use rights. Already, the movie industry's use of encryption on DVDs has curtailed consumers' ability to make legitimate, personal-use copies of movies they have purchased. The DMCA Impedes Competition and Innovation. Rather than focusing on pirates, some have wielded the DMCA to hinder legitimate competitors. For example, the DMCA has been used to block aftermarket competition in laser printer toner cartridges, garage door openers, and computer maintenance services. Similarly, Apple has used the DMCA to tie its iPhone and iPod devices to Apple's own software and services. The DMCA Interferes with Computer Intrusion Laws. Further, the DMCA has been misused as a general-purpose prohibition on computer network access, a task for which it was not designed and to which it is ill-suited. For example, a disgruntled employer used the DMCA against a former contractor for simply connecting to the company's computer system through a virtual private network ("VPN").
  •  
    Since they were enacted in 1998, the "anti-circumvention" provisions of the Digital Millennium Copyright Act ("DMCA"), codified in section 1201 of the Copyright Act, have not been used as Congress envisioned. Congress meant to stop copyright infringers from defeating anti-piracy protections added to copyrighted works and to ban the "black box" devices intended for that purpose.1 In practice, the anti-circumvention provisions have been used to stifle a wide array of legitimate activities, rather than to stop copyright infringement. As a result, the DMCA has developed into a serious threat to several important public policy priorities:
Ian Schlom

Statement of the IWA- Secretariat concerning the mobilizations against the present capi... - 0 views

  •  
    Below is full text: For the International Workers Association (IWA) class struggle is not a theoretical abstraction but a fact in the daily lives of workers. Our way of organizing is expressed through democratic federalist structures based on recallable delegates. The IWA rejects class collaboration in all its forms. Works councils and other corporatist bodies based on social partnership are means of undermining class struggle. State funding is designed to undermine independent working class action and organization. For us the only relationship between worker and boss can be class struggle. And class struggle must grow until capitalism and the state is swept away by the solidarity of the international working class - to be replaced by the free federation of workers associations based on libertarian communism! In recent years the IWA has organized countless international campaigns in support of workers worldwide. The attacks come in many fields and in Spain by the various labour reforms, cuts in the pension system, reform of collective bargaining and social cuts. On September 29 , the CNT-AIT with other unions and social organizations will take to the street, in the process of building towards a general strike! It is in this anarchosyndicalist spirit that the IWA-Secretariat sends its greetings and support to the Spanish CNT-AIT and all workers who by self- activity, protests, direct actions and solidarity are engaged in the fight against the capitalist offensive! Oslo, September 27th 2011 IWA-Secretariat
Ian Schlom

Noam Chomsky Post-Election: We Need More Organization, Education, Activism - 0 views

  •  
    This is an interview of Noam Chomsky getting what he thinks about the election in 2012.
Muslim Academy

US troops in Afghanistan-What more can US troops do before they leave - 0 views

  •  
    The American troops had established their base in Afghanistan. In the process of fighting the terror groups, so many people have lost their lives in a manner that cannot be understood. However, people should not be biased and take the efforts that had been extended in the Afghanistan in a negative way. Surely, there is much more that has been achieved by the soldiers in Afghanistan. It is evident that the people can now take part in their daily activities without the fear of being attacked by the terror groups all to the courtesy of the American troops. Even though there is much more the Afghanistan government and civilians can thank the troops for, the Americans need to understand that there is much more that they need to do before they leave Afghanistan, so that they ensure everything runs as smoothly as it was before the terror attacks. It is very evident that thousands of people have died in the process of fighting.
Christopher Aiden

HOW TO BOOST PROFIT MARGINS OF A LAW FIRM? - 0 views

  •  
    Maintaining the Profitability of a Legal Firm is a highly complex task due to the variant industry trends and nature of core activities. A Law firms has to handle different legal and non legal tasks of it's each and every client. This Blog will help you out with simple but effective tips to boost the productivity of your Law Firm in terms of ROI and Competence... https://goo.gl/2kCQwP
Muslim Academy

The Silsilah Dialogue Movement Muslim Coordinator - Prof. Alzad Sattar - 0 views

  •  
    The Silsilah Dialogue Movement is a Filipino movement in Mindanao that aims to unite Christians and Muslims, as well as other people of different religion and faith. Prof. Alzad Sattar is proud to be a member and Muslim coordinator of the Inter-faith Council of Leaders in Basilan. He took up Political Science in Basilan State College and had his Masters Degree in the University of the Philippines. He became a professor in Basilan State College since 1996. Presently, he is the Assistant Dean of Academic Support and Services and Dean of the College of Islamic Studies. He is also an active participant and member of non-government organizations that promote peace and harmony like the Silsilah Dialogue Movement. As a child born in the city of Basilan, he believes that this place is very beautiful. Despite of this harmonious scenery with its natural white beach and sea resources, for him, Basilan has a large diversity when it comes to cultures and religions between the people living in this paradise. He hopes that someday this diversity would surpass through the help of the Dialogue. The following are some excerpts and inspiring keys mentioned by Prof. Alzad Sattar in an interview in the Silsilah Dialogue Movement: What was the impact of Silsilah Dialogue Movement to you as person? Prof Sattar: Silsilah actually transformed a lot in me as a person. I remember in the past, I had biases and prejudices against Christians because of a lot of factors. Number one factor is the orientations that I had, that Christians are like this and that and the second factor was the situation that I had experienced. I was born during the Martial law and at that time, many of my relatives died. The people who killed them are the Philippine soldiers who happened to be Christians. This contributed to my perception about the Christians. One factor that also contributed in my biases is the books I read. Like what I said, I was a PolSci graduate and because of that I rea
Muslim Academy

Stop Killing the Burmese Muslims! - 0 views

  •  
    The total population of Burma is 75 million where Muslims are small minority,they are just 0.7 million. Muslims in Burmese have been suffering since 1962 when army took charge of the government.Army has been doing brutal activities against Burmese Muslims since 1962. However the latest incidents have broken all records which for the first time also got the attention of the whole world.Courtesy to Burmese Buddhist photographer who took the painful images and uploaded them in the Internet. It all started on 3rd June 2012 when 11 Muslims were killed by Burmese army and Buddhist.Burmese Army stopped bus and killed Muslims after getting them out of the bus. Muslims carried out a peaceful protest in the Muslim majority province Arkan but Army and Mob again attacked Muslims and killed many protesters.
thinkahol *

U.S. Special Forces Operating Secretly in 120 Countries - 0 views

  •  
    Most Americans are aware that U.S. forces are involved in missions in Afghanistan, Iraq, and Libya. Those who pay closer attention to the news may know that American troops are also active in Pakistan, Yemen, and Somalia. But according to Nick Turse of TomDispatch.com, those six nations comprise only five percent of the total number of countries in which the Department of Defense is conducting operations. "A secret force within the U.S. military," says Turse, "is undertaking operations in a majority of the world's countries" - at a rate of 70 such operations per day.
thinkahol *

End Limited Liability (and Save the World) - Sign the Petition | Change.org - 0 views

  •  
    Democrat or Republican, Libertarian or Socialist, politically active and not we are reaping the bitter reward of a political and legal system designed to maximize corporate profits at the expense of our environment, our livelihood, and our very lives. Our society is unraveling. We all know this. This is not idle conspiracy theory. These are well established facts. We are ruled by a headless beast that is no longer accountable to us. That it is headless makes it no less beastly. But there is a silver bullet. It's within our power to restore a functioning free market; to take back our democracy. We must end limited liability for corporations. Only when wealthy investors are no longer shielded from the costs that we collectively bear in their stead, only when they can no longer hide from the burden they have placed on us, only then can we expect the end of corporate plunder.   We are running out of time. Millions of Germans lost faith in the free market and capitalism during the Great Depression, and "with the failure of the left to provide a viable alternative, they became vulnerable to the rhetoric of a party that, once it came to power, combined Keynesian pump-priming measures that brought unemployment down to 3 percent with a devastating counterrevolutionary social and cultural program."
thinkahol *

Rally to Restore Sanity - 0 views

  •  
    "I'm mad as hell, and I'm not going to take it anymore!"  Who among us has not wanted to open their window and shout that at the top of their lungs?  Seriously, who?  Because we're looking for those people. We're looking for the people who think shouting is annoying, counterproductive, and terrible for your throat; who feel that the loudest voices shouldn't be the only ones that get heard; and who believe that the only time it's appropriate to draw a Hitler mustache on someone is when that person is actually Hitler. Or Charlie Chaplin in certain roles.  Are you one of those people? Excellent. Then we'd like you to join us in Washington, DC on October 30 -- a date of no significance whatsoever -- at the Daily Show's "Rally to Restore Sanity." Ours is a rally for the people who've been too busy to go to rallies, who actually have lives and families and jobs (or are looking for jobs) -- not so much the Silent Majority as the Busy Majority. If we had to sum up the political view of our participants in a single sentence... we couldn't. That's sort of the point.  Think of our event as Woodstock, but with the nudity and drugs replaced by respectful disagreement; the Million Man March, only a lot smaller, and a bit less of a sausage fest; or the Gathering of the Juggalos, but instead of throwing our feces at Tila Tequila, we'll be actively *not* throwing our feces at Tila Tequila. Join us in the shadow of the Washington Monument. And bring your indoor voice. Or don't. If you'd rather stay home, go to work, or drive your kids to soccer practice... Actually, please come anyway. Ask the sitter if she can stay a few extra hours, just this once. We'll make it worth your while.
thinkahol *

Amy Goodman: WikiLeaks and the End of U.S. 'Diplomacy' - Truthdig - 0 views

  •  
    WikiLeaks is again publishing a trove of documents, in this case classified U.S. State Department diplomatic cables. The whistle-blower website will gradually be releasing more than 250,000 of these documents in the coming months so that they can be analyzed and gain the attention they deserve. The cables are internal, written communications among U.S. embassies around the world and also to the U.S. State Department. WikiLeaks described the leak as "the largest set of confidential documents ever to be released into the public domain [giving] an unprecedented insight into U.S. government foreign activities."
Arabica Robusta

Keane Bhatt, "Noam Chomsky on Hopes and Prospects for Activism: 'We Can Achieve a Lot'" - 1 views

  • I think he would take it for granted that elites are basically Marxist -- they believe in class analysis, they believe in class struggle, and in a really business-run society like the United States, the business elites are deeply committed to class struggle and are engaged in it all the time.  And they understand.  They're instinctive Marxists; they don't have to read it.
  • In fact, Malaysia also came out of the Asian crisis.  It was imposing capital controls.  Now the economists were all saying it's a disaster.  But they did quite well.  Same with Argentina, the former poster child for the IMF, leading to a serious crisis.  It then disregarded all the warnings and doctrines and the economy did very well, contrary to predictions.
  • using the multidimensional poverty index, there were 645 million poor, or 55 percent of India's population -- more than in the poorest 26 African countries combined. 
  • ...3 more annotations...
  • there is sometimes dramatic conflict between the developmentalists, like left president Correa, and the indigenous communities affected by mining and dams.  Also, Evo Morales, despite being hugely popular, recently had to deal with a very big general strike in Potosí.  What do you make of these dynamics?  What are the hopes and prospects in Latin America regarding raising living standards, the paths of industrialization, environmental considerations, the role of social movements, and avoiding state coercion?
  • I don't know of any simple general answer to your question of how this will all turn out.  The problems are often not simple.  A great deal is at stake, not just for the people of the countries.  Resource extraction impacts a global environment that is increasingly at severe risk.
  • You said, "It's quite striking that we and other western countries can't reach, can't even approach, can't even dream about the level of democracy they had in Haiti.  That's pretty shocking.  Here's one of the poorest countries in the world.  The population that organized to win that election is among the most repressed and impoverished in the world; they managed to organize enough to enter the electoral arena without any resources and elect their own candidate."  Praising Bolivia at the same time, you asked, "Is it believable that we can't do the same? . . . We can take lessons from them.  Anything they've done we can do a thousand times more easily."
  •  
    The founding fathers were very concerned about the danger of democracy and spoke quite openly about the need to construct the democratic institutions so that threat would be contained.  That's why the Senate has so much more power than the House, to mention just one example.
1 - 20 of 66 Next › Last »
Showing 20 items per page