Skip to main content

Home/ Politically Minded/ Group items tagged Executive

Rss Feed Group items tagged

Fay Paxton

Moving Forward with Executive Orders |The Political Pragmatic - 0 views

  •  
    When Congress is unable to agree on how to implement a law or program, it leaves an opening for the President to take over, in the form of an Executive Order. I wanted to look back and see how past Presidents have used Executive Orders. This is what I found:
thinkahol *

Bradley Manning Support Network » Deception sustains unjust wars - honesty en... - 0 views

  •  
    Troops are coming home from Iraq despite the best efforts of the Obama administration to keep them there. "We're relieved to know all the troops will be home at the end of the year. This would not have been possible without the courageous actions of Wikileaks and the alleged participation of Bradley Manning" says Executive Director of Iraq Veterans Against the War, Jose Vasquez. Until their abrupt reversal a few weeks ago, the Obama administration had been working hard to maintain between 8000 and 20,000 troops in Iraq after the current Status of Forces agreement was set to expire at the end of this year. Fortunately, the Iraqi government refused to renew the judicial immunity, under which the U.S. Armed Forces had been operating. Establishment news outlets have largely ignored the reason for this sudden change of plans. A few weeks before the negotiations between Washington and Baghdad reached an impasse, WikiLeaks released a cable providing clear evidence that U.S. forces had been engaged in a cover up of the heinous execution of civilian non-combatants following a raid of a suspected insurgent stronghold. "A U.S. diplomatic cable made public by WikiLeaks provides evidence that U.S. troops executed at least 10 Iraqi civilians, including a woman in her 70s and a 5-month-old infant, then called in an airstrike to destroy the evidence, during a controversial 2006 incident in the central Iraqi town of Ishaqi." (link)
thinkahol *

U.S. Chamber To Rank Politicians On Whether They Vote To Keep Contractor Donations Secr... - 0 views

  •  
    The U.S. Chamber of Commerce has written a letter to members of the House telling them that voting for federal contractors to be more transparent about their political spending will negatively impact their legislative scorecard. "The U.S. Chamber of Commerce strongly supports legislative proposals to ensure that political spending -- or the lack thereof -- continues to play no role in federal contracting decisions," the Chamber's R. Bruce Josten wrote in the letter sent on Wednesday. "Therefore, the Chamber supports amendments that have been offered by Rep. Cole to several Fiscal Year 2012 appropriations bills considered by the full House, and any similar amendments should they be offered to the remaining FY 2012 appropriations bills," he wrote. Meanwhile, more than sixty members of the House signed a letter sent to the White House by Rep. Anna G. Eshoo (D-CA) which expressed strong support for a draft executive order which would require companies that get taxpayer dollars to disclose their political expenditures. Disclosure, the letter says, "will not politicize the procurement process -- it will improve it." "Political expenditures are already well-known to those that make them and to the officials who benefit," the letter states. "With disclosure, the public will have access to this information as well, allowing them to judge whether contracts were awarded based on merit. A meritorious procurement system is the only responsible use of taxpayer money, making this a deficit reduction effort as much as a campaign finance reform issue." Both the Chamber and House Republicans have argued that the proposed executive order -- first leaked in April -- is a plot by the Obama administration to silence political opponents. Supporters of the measure have said the executive order -- by bringing donations out into the open -- would actually discourage federal contracting officials from doing favors for contractors based on their donations to third-party political groups
Fay Paxton

The Political Pragmatic - 0 views

  •  
    When Congress is unable to agree on how to implement a law or program, it leaves an opening for the President to take over, in the form of an Executive Order. I wanted to look back and see how past Presidents have used Executive Orders. This is what I found:
Michael Haltman

Watch live oil company executives getting crucified - 1 views

  •  
    Watch the oil company executives get crucified by the Congress live on C-SPAN3 concerning the BP oil spill and the future of offshore drilling in the United States.
thinkahol *

Bill Keller's self-defense on "torture" - Glenn Greenwald - Salon.com - 0 views

  •  
    In response to the Harvard study documenting how newspapers labeled waterboarding as "torture" for almost 100 years until the Bush administration told them not to, The New York Times issued a statement justifying this behavior on the ground that it did not want to take sides in the debate. Andrew Sullivan, Greg Sargent and Adam Serwer all pointed out that "taking a side" is precisely what the NYT did: by dutifully complying with the Bush script and ceasing to use the term (replacing it with cleansing euphemisms), it endorsed the demonstrably false proposition that waterboarding was something other than torture. Yesterday, the NYT's own Brian Stelter examined this controversy and included a justifying quote from the paper's Executive Editor, Bill Keller, that is one of the more demented and reprehensible statements I've seen from a high-level media executive in some time (h/t Jay Rosen):
Skeptical Debunker

The Comprehensive National Cybersecurity Initiative | The White House - 0 views

  • The CNCI consists of a number of mutually reinforcing initiatives with the following major goals designed to help secure the United States in cyberspace: To establish a front line of defense against today’s immediate threats by creating or enhancing shared situational awareness of network vulnerabilities, threats, and events within the Federal Government—and ultimately with state, local, and tribal governments and private sector partners—and the ability to act quickly to reduce our current vulnerabilities and prevent intrusions. To defend against the full spectrum of threats by enhancing U.S. counterintelligence capabilities and increasing the security of the supply chain for key information technologies. To strengthen the future cybersecurity environment by expanding cyber education; coordinating and redirecting research and development efforts across the Federal Government; and working to define and develop strategies to deter hostile or malicious activity in cyberspace.
  •  
    President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we as a government or as a country are not adequately prepared to counter. Shortly after taking office, the President therefore ordered a thorough review of federal efforts to defend the U.S. information and communications infrastructure and the development of a comprehensive approach to securing America's digital infrastructure. In May 2009, the President accepted the recommendations of the resulting Cyberspace Policy Review, including the selection of an Executive Branch Cybersecurity Coordinator who will have regular access to the President. The Executive Branch was also directed to work closely with all key players in U.S. cybersecurity, including state and local governments and the private sector, to ensure an organized and unified response to future cyber incidents; strengthen public/private partnerships to find technology solutions that ensure U.S. security and prosperity; invest in the cutting-edge research and development necessary for the innovation and discovery to meet the digital challenges of our time; and begin a campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms and begin to build the digital workforce of the 21st century. Finally, the President directed that these activities be conducted in a way that is consistent with ensuring the privacy rights and civil liberties guaranteed in the Constitution and cherished by all Americans.
thinkahol *

President Obama, Stand Up to the U.S. Chamber and Fight for Disclosure - 0 views

  •  
    "We will fight it through all available means […] To quote what they say every day on Libya, all options are on the table." That's what the chief lobbyist for the U.S. Chamber of Commerce told the New York Times after hearing the White House may issue an executive order requiring corporations that do business with the government to disclose their political spending. The Chamber's pledge to fight tooth and nail to keep the American people in the dark about conflicts of interest in government is appalling, but not surprising. If corporations and their executives are spending on politicians in an effort to "win" government contracts, the American people should know.  Urge President Obama to stand up to the U.S. Chamber and fight for disclosure. Sign the petition today!
Joe La Fleur

Obamas NEW Dictatorship Executive Order | Obama - 0 views

  •  
    WHAT WILL YOU DO WHEN YOU HAVE LOST ALL OF YOUR LIBERTY AND YOU CAN'T VOTE HIM OUT? LIBERAL DEMOCRATS LOST IN THE WONDER OF THEIR MESSAIH WILL NEVER NOTICE!
Sarah Eeee

Income Inequality and the 'Superstar Effect' - NYTimes.com - 0 views

  • In 1982, the top 1 percent of pop stars, in terms of pay, raked in 26 percent of concert ticket revenue. In 2003, that top percentage of stars — names like Justin Timberlake, Christina Aguilera or 50 Cent — was taking 56 percent of the concert pie.
  • . In an article entitled “The Economics of Superstars,” he argued that technological changes would allow the best performers in a given field to serve a bigger market and thus reap a greater share of its revenue. But this would also reduce the spoils available to the less gifted in the business.
  • IF one loosens slightly the role played by technological progress, Dr. Rosen’s framework also does a pretty good job explaining the evolution of executive pay. In 1977, an elite chief executive working at one of America’s top 100 companies earned about 50 times the wage of its average worker. Three decades later, the nation’s best-paid C.E.O.’s made about 1,100 times the pay of a worker on the production line.
  • ...2 more annotations...
  • CAPITALISM relies on inequality. Like differences in other prices, pay disparities steer resources — in this case, people — to where they would be most productively employed.
  • In poor economies, fast economic growth increases inequality as some workers profit from new opportunities and others do not. The share of national income accruing to the top 1 percent of the Chinese population more than doubled from 1986 to 2003.
  •  
    What impact do the incredible salaries of superstars have on the rest of us? What has changed, technologically and socially, to precipitate these inequities? This article also offers a brief look at the relationship between income inequality and economic growth, comparing the US throughout its history and the US vis a vis several European countries. (Part 1 of 2)
thinkahol *

Tea Party Rebels Quickly Tamed | Truthout - 0 views

  •  
    Faster than you can say "business as usual," freshman Republicans on the House Financial Services Committee have begun to execute Wall Street's agenda.
Ian Schlom

Obama nominates Jacob Lew, budget-cutter and ex-banker, to head Treasury - 0 views

  •  
    in the article: US President Barack Obama announced the nomination of current White House chief of staff Jacob Lew as treasury secretary Thursday, underscoring the administration's commitment to slashing entitlements and its domination by Wall Street. Lew, a longtime Washington operative and former Wall Street executive, helped negotiate cuts to Social Security with the Reagan administration in 1983, worked to slash social spending in the Clinton administration's Office of Management and Budget (OMB), and served as the Obama administration's point-man in budget-cutting negotiations with congressional Republicans. Prior to joining the Obama administration in 2009, he earned millions of dollars as the chief operating officer of Citigroup's Alternative Investments unit, which made bets against the housing market as it collapsed. Holy shit. That's maybe all one needs to read of this article. That's pretty ridiculous.
thinkahol *

The moral crisis of modern capitalism - Salon.com - 0 views

  •  
    Even conservative idol William F. Buckley took issue with "executive plunder." Can fairness be restored?
thinkahol *

Unjust Spoils | The Nation - 0 views

  •  
    The Great Recession could have spawned another era of fundamental reform, just as the Great Depression did. But the financial rescue reduced immediate demands for broader reform. Obama might still have succeeded had he framed the challenge accurately. Yet in reassuring the public that the economy would return to normal, he missed a key opportunity to expose the longer-term scourge of widening inequality and its dangers. Containing the immediate financial crisis and then claiming the economy was on the mend left the public with a diffuse set of economic problems that seemed unrelated and inexplicable, as if a town's fire chief dealt with a conflagration by protecting the biggest office buildings but leaving smaller fires simmering all over town: housing foreclosures, job losses, lower earnings, less economic security, soaring pay on Wall Street and in executive suites.
thinkahol *

FDL Book Salon Welcomes Bruce Fein, American Empire Before the Fall | Book Salon - 0 views

  •  
    There's no doubting the conservative bona fides of Bruce Fein. A high-level Justice Department lawyer in the Reagan administration in the 1980s and previously a resident scholar with the Heritage Foundation, he is a long-time advocate for uncompromising right-wing political principles. Yet paradoxically, Fein has been, and remains, one of the most eloquent and incisive political voices over the last decade. He was one of the earliest and most emphatic critics of Bush and Cheney's radical abuses of executive power. Two weeks after The New York Times revealed in December, 2005, that Bush had ordered the NSA to illegally eavesdrop on Americans without the warrants required by law, Fein used his column in the right-wing Washington Times to warn that "Mr. Bush has adamantly refused to acknowledge any constitutional limitations on his power to wage war indefinitely"; to scorn as "war powers nonsense" the theories assembled "to defend Mr.
thinkahol *

U.N. Report finds Israel "summarily executed" U.S. citizen on flotilla - Glenn Greenwal... - 0 views

  •  
    The silence of the U.S. government and media in the face of this report is illustrative and telling
Skeptical Debunker

Leaked intelligence documents: Here's what Facebook and Comcast will tell the police ab... - 0 views

  • The "Facebook Subpoena/Search Warrant Guidelines" from the Cryptome site are dated 2008, so there's a chance they've been superseded. The document spells out how law enforcement and intelligence agenices should go about requesting information about Facebook users, and details what information is turned over. Following is what Facebook will turn over about you, taken verbatim from the guide: Types of Information Available User Neoprint The Neoprint is an expanded view of a given user profile. A request should specify that they are requesting a “Neoprint of used Id XXXXXX”. User Photoprint The Photoprint is a compilation of all photos uploaded by the user that have not been deleted, along with all photos uploaded by any user which have the requested user tagged in them. A request should specify that they are requesting a “Photoprint of user Id XXXXXX”. User Contact Info All user contact information input by the user and not subsequently deleted by the user is available, regardless of whether it is visible in their profile. This information may include the following: Name Birth date Contact e-mail address(s) Physical address City State Zip Phone Cell Work phone Screen name (usually for AOL Messenger/iChat) Website With the exception of contact e-mail and activated mobile numbers, Facebook validates none of this information. A request should specify that they are requesting "Contact information of user specified by [some other piece of contact information]". No historical data is retained. Group Contact Info Where a group is known, we will provide a list of users currently registered in a group. We will also provide a PDF of the current status of the group profile page. A request should specify that they are requesting "Contact information for group XXXXXX". No historical data is retained. IP Logs IP logs can be produced for a given user ID or IP address. A request should specify that they are requesting the "IP log of user Id XXXXXX" or "IP log of IP address xxx.xxx.xxx.xxx". The log contains the following information: * Script – script executed. For instance, a profile view of the URL http://www.facebook.com/profile.php?id=29445421 would populate script with "profile.php" * Scriptget – additional information passed to the script. In the above example, scriptget would contain "id=29445421" * Userid – The Facebook user id of the account active for the request * View time – date of execution in Pacific Time * IP – source IP address IP log data is generally retained for 90 days from present date. However, this data source is under active and major redevelopment and data may be retained for a longer or shorter period. Special Requests The Facebook Security Team may be able to retrieve specific information not addressed in the general categories above. Please contact Facebook if you have a specific investigative need prior to issuing a subpoena or warrant.
  • Comcast The Comcast document is labeled "Comcast Cable Law Enforcement Handbook," and is dated 2007, so there's a possibility that it, too, has been superseded. As with the other documents, it explains how law enforcement agenices can get information, and details what information is available. There's a great deal of detail in the 35-page document, which describes what Internet, phone, and television information will be turned over. For example, here's the IP information it will make available: Comcast currently maintains Internet Protocol address log files for a period of 180 days. If Comcast is asked to respond for information relating to an incident that occurred beyond this period, we will not have responsive information and can not fulfill a legal request. (Comcast can process and respond to preservation requests as outlined below in this Handbook.) As expected, Comcast will also turn over the emails, including attachments, of those who use Comcast's email service, but "In cases involving another entity’s email service or account, Comcast would not have any access to or ability to access customer email in response to a legal request." Information Comcast turns over to law enforcement agencies varies according to the request. For example, a grand jury subpoena will yield more information than a judicial summons, as you can see in the excerpt below. Comcast notes, though, that this is just a sample, and that "Each request is evaluated and reviewed on a case by case basis in light of any special procedural or legal requirements and applicable laws." So the examples "are for illustration only."
  • For those who worry about privacy, though, all of this information is small potatoes. The real worry is about the use of what are called pen registers or trap-and-trace devices, which essentially capture all of your Internet activity --- the Web sites you visits, the emails you send and receive, IM traffic, downloads, and so on. Here's what the document says about them: Pen Register / Trap and Trace Device Title 18 U.S.C. § 3123 provides a mechanism for authorizing and approving the installation and use of a pen register or a trap and trace device pursuant to court order. All orders must be coordinated prior to submission to Comcast. Law enforcement will be asked to agree to reimburse Comcast's reasonable costs incurred to purchase and/or install and monitor necessary equipment. See "Reimbursement," below.
  • ...2 more annotations...
  • As for your voice calls made via Comcast, here's what the company will turn over: Call Detail Records - Comcast maintains two years of historical call detail records (records of local and long distance connections) for our Comcast Digital Voice telephone service. This includes local, local toll, and long distance records. Comcast also currently provides traditional circuit-switched telephone service branded Comcast Digital Phone. Call detail records for this service are collected by AT&T and are available for approximately two years as well. To determine which type of service is involved, contact the Legal Demands Center—Voice and Video at 800-871-6298. Account Records - Account records are generally stored for approximately two years after the termination of an account. If the account has an outstanding balance due, records may be retained for a longer period of time. As with Internet information, what phone information will be turned over depends on the specific kind of legal request, and the examples "are for information only." Here's an excerpt:
  • And, as you would expect, there is the same pen register/trap-and-trace device language as in the section about the Internet. Oddly enough, it appears that when it comes to information about your television viewing habits, you have more privacy rights than you do when it comes to information about your Internet and voice use, because it can only be turned over in response to a court order, not a subpoena. Here's what the document has to say about TV information: Subscriber Account Identification and Related Records For subscribers to our cable television service, the Cable Act requires Comcast as a cable operator to disclose personally identifiable information to a governmental entity solely in response to a court order (and not, for example, a subpoena) or with the subscriber's express written consent. The Cable Act requires that the cable subscriber be afforded the opportunity to appear and contest in a court proceeding relevant to the court order any claims made in support of the court order. At the proceeding, the Cable Act requires the governmental entity to offer clear and convincing evidence that the subject of the information is reasonably suspected of engaging in criminal activity and that the information sought would be material evidence in the case. See 47 U.S.C. § 551(h). Why does the law give you more privacy protection over your television viewing habits than your Internet or phone use? I haven't a clue --- ask your congressman.
  •  
    Wonder what information Facebook and Comcast will turn over to police and intelligence agencies about you? Cryptome, the site that last week posted the leaked Microsoft "spy" manual, has posted company documents that purport to describe what those companies will reveal about you. As with the Microsoft document, the information is eye-opening.
1 - 20 of 55 Next › Last »
Showing 20 items per page