Skip to main content

Home/ Politically Minded/ Group items tagged Necessary

Rss Feed Group items tagged

thinkahol *

Technology: Necessary but Insufficient for Human Survival | Thinkahol's Blog - 0 views

  •  
    In the context of technology the only way out is through. Global society is dependent on artificially inflated energy resources-i.e. oil-that are directly leading us toward total collapse. Technology is being used to most efficiently maximize wealth of the largest corporate conglomerates at the expense of the social fabric and a living environment. The biosphere is in fact collapsing. The technology exists to solve our technical problems but the solutions do not seem like they will be effectively put to use. The power structures concentrating money off the status quo are too entrenched. Each human is called on to become more aware.
Muslim Academy

Response - A Response to Islamophobia World - 0 views

  •  
    Islam is a balanced religion. It believes in respecting all sects, all cultures and all civilizations. All laws relate to Islam are meant for Muslim benefits . It is true that in the recent years, Islam has become a victim of extremism. The purpose of Islam has never been to spread Islamophobia. Islamic ideas have been exploited to give them the shape of Islamophobia. Islam does not define a mosque and state as distinctive. A mosque is there, to provide a forum to the Muslim to unite and pray. The gesture is to promote congregational prayers, which is also an aspect of Christianity. Islam does not believe in forcing its concepts upon Non-Muslims. Unethical Jehad has never been an Islamic thought. It is just that some extremist groups are trying to manipulate Islam and use the Ideals to their benefit. Islam believes in respecting all religions. That is what the Holy Prophet (PBUH) taught the Muslims. Islam does not preach unkindness to any. May it be your enemy or slave. These are not the aspects of Jihad. A woman can legally have a physical relationship with her husband only. It is definitely no concept of Jihad. Islam believes in respecting a woman, not exploiting her dignity and respect. Islam does not allow illegal confiscation of property during Jihad. Islam does not promote destruction. Taxes does not mean degrading. Taxes are defined to establish a system and maintain a proper division of wealth. If Christian and jews had to pay Jiziah, Muslims had to pay Zakat .Brutality is not a custom of Islam. A Muslim derives so much contentment from Islamic values, that they do not need to run away from the religion. Anything , which drives a person from sanity is not liked in Islam. The reason being that all wrongs can be committed, when a person is drunk and is not in a normal state of mind. This is human nature, that we cannot drive contentment until we avenge someone for the bad they have done to us. However Islam prefers forgiveness. Sometimes a harsh punishment
thinkahol *

Sen. Dianne Feinstein: Urgent Action Necessary to Stop Health Insurance Corporation Greed - 0 views

  •  
    At a time of great hardship for many Americans, it is unconscionable that a few mega-corporations can simply misplace a few decimal points and quickly rack up millions of dollars in unjust profits.
thinkahol *

WHAT'S REALLY BEHIND QE2? - 0 views

  •  
    The deficit hawks are circling, hovering over QE2, calling it just another inflationary bank bailout. But unlike QE1, QE2 is not about saving the banks. It's about funding the federal deficit without increasing the interest tab, something that may be necessary in this gridlocked political climate just to keep the government functioning.
thinkahol *

ThinkProgress » Reagan Budget Director: GOP Has Abandoned Fiscal Responsibili... - 0 views

  •  
    As Congress prepares to take up extension of the Bush tax cuts during its lame duck session, Republican lawmakers have been unanimous in demanding that the cuts for the richest two percent of Americans be extended, claiming they are necessary for economic growth and that tax cuts (miraculously) pay for themselves.
Skeptical Debunker

The Comprehensive National Cybersecurity Initiative | The White House - 0 views

  • The CNCI consists of a number of mutually reinforcing initiatives with the following major goals designed to help secure the United States in cyberspace: To establish a front line of defense against today’s immediate threats by creating or enhancing shared situational awareness of network vulnerabilities, threats, and events within the Federal Government—and ultimately with state, local, and tribal governments and private sector partners—and the ability to act quickly to reduce our current vulnerabilities and prevent intrusions. To defend against the full spectrum of threats by enhancing U.S. counterintelligence capabilities and increasing the security of the supply chain for key information technologies. To strengthen the future cybersecurity environment by expanding cyber education; coordinating and redirecting research and development efforts across the Federal Government; and working to define and develop strategies to deter hostile or malicious activity in cyberspace.
  •  
    President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we as a government or as a country are not adequately prepared to counter. Shortly after taking office, the President therefore ordered a thorough review of federal efforts to defend the U.S. information and communications infrastructure and the development of a comprehensive approach to securing America's digital infrastructure. In May 2009, the President accepted the recommendations of the resulting Cyberspace Policy Review, including the selection of an Executive Branch Cybersecurity Coordinator who will have regular access to the President. The Executive Branch was also directed to work closely with all key players in U.S. cybersecurity, including state and local governments and the private sector, to ensure an organized and unified response to future cyber incidents; strengthen public/private partnerships to find technology solutions that ensure U.S. security and prosperity; invest in the cutting-edge research and development necessary for the innovation and discovery to meet the digital challenges of our time; and begin a campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms and begin to build the digital workforce of the 21st century. Finally, the President directed that these activities be conducted in a way that is consistent with ensuring the privacy rights and civil liberties guaranteed in the Constitution and cherished by all Americans.
Skeptical Debunker

Analysis: Republicans setting filibuster record - Yahoo! News - 0 views

  • Opposition Republicans are using the delaying tactic at a record-setting pace. "The numbers are astonishing in this Congress," says Jim Riddlesperger, political science professor at Texas Christian University in Fort Worth. The filibuster, using seemingly endless debate to block legislative action, has become entrenched like a dandelion tap root in the midst of the shrill partisanship gripping Washington. But the filibuster is nothing new. Its use dates to the mists of Senate history, but until the civil rights era, it was rarely used.
  • As a matter of political philosophy, the concept of the filibuster arises from a deep-seated, historic concern among Americans that the minority not be steamrolled by the majority. It is a brake and protective device rooted in the same U.S. political sensibility that gave each state two senators regardless of population. The same impulse gave Americans the Electoral College in presidential contests — a structure from earliest U.S. history designed to give smaller population states greater influence in choosing the nation's leader. Given recent use of the filibuster by minority Republicans and the party's success in snarling the legislative process in this Congress, Democrats say the minority has gone way beyond just protecting its interests. The frequency of filibusters — plus threats to use them — are measured by the number of times the upper chamber votes on cloture. Such votes test the majority's ability to hold together 60 members to break a filibuster. In the 110th Congress of 2007-2008, with Republicans in the minority, there were a record 112 cloture votes. In the current session of Congress — the 111th — for all of 2009 and the first two months of 2010 the number already exceeds 40. The most the filibuster has been used when Democrats were in the minority was 58 times in the 106th Congress of 1999-2000.
  •  
    Having railed against the Democratic minorities' use of ANY filibuster in the last several Congressional sessions when Republicans were in the majority, the Republicans now hypocritically are taking the use of the filibuster to new heights. Forgotten are their own strident and indignant demands that the "people" deserved the Senate allowing an "up or down vote". And that they would (and did) use a "nuclear option" or reconciliation if necessary to make that happen. The filibuster - tool of obstruction in the U.S. Senate - is alternately blamed and praised for wilting President Barack Obama's ambitious agenda. Some even say it's made the nation ungovernable.
thinkahol *

A "Pledge of Resistance" to Defend Social Security (and Defund the Empire) - 0 views

  •  
    For the third time in the last 20 years, establishment voices with high-profile slots in traditional media are trying to convince the public to accept cuts to Social Security by endlessly claiming such cuts are necessary, without giving coherent evidence to justify the claim. Twice, under former presidents Clinton and George W. Bush, these voices were defeated - but they didn't give up. And now they are in striking distance of their goal: the fact that Republicans have taken over the House, combined with the fact that the president appointed a deficit reduction commission which nearly recommended a cut in Social Security benefits - and might well have done so if Representative Schakowsky hadn't worked to undermine the co-chairs' plan - means that one can't be complacent; some reports have suggested that the president may indicate support for cuts to Social Security in his State of the Union speech. Of the two principal Washington political actors who will shape the outcome - the Republican leadership and the president's team - one is a determined adversary of the public interest, the other a very uncertain ally. The most successful anti-poverty program in US history is again in grave danger.
thinkahol *

Wars Are Not Fought on Battlefields - 0 views

  •  
    Truthout is publishing chapter eight of my new book "War Is A Lie." I should explain where it fits in the overall argument I've made. The book strives to make a comprehensive case against the very idea that there can ever be a good or just war, any more than there can be a good slavery or a just rape. While Americans often turn against particular wars after cheering for them, many people maintain the fantasy that there could be a really good or necessary war next month. This delusion helps to keep around what President Eisenhower 50 years ago this week called the military-industrial complex, which is itself a large source of pressure for more wars.
thinkahol *

Psychology, Ideology, Utopia, & the Commons - 0 views

  •  
    The failure of social scientists to seriously question their own ideological and methodological assumptions contributes to the complex interrelationship between global ecological and individual psychological problems. Much of the literature on the tragedy of the commons focuses on saving the global commons through increased centralization and regulation, at the expense of the individual's autonomy and psychological sense of community. "Utopian" speculation in general and anarchist political analysis in particular are necessary correctives to misplaced attempts to merely rearrange the elements of the status quo rather than to radically alter it in a direction more in keeping with both survival and human dignity.
thinkahol *

ThinkProgress » REPORT: You Have More Money In Your Wallet Than Bank Of Ameri... - 0 views

  •  
    Today, hundreds of thousands of people comprising a Main Street Movement - a coalition of students, the retired, union workers, public employees, and other middle class Americans - are in the streets, demonstrating against brutal cuts to public services and crackdowns on organized labor being pushed by conservative politicians. These lawmakers that are attacking collective bargaining and cutting necessary services like college tuition aid and health benefits for public workers claim that they have no choice but than to take these actions because both state and federal governments are in debt.
thinkahol *

Occupied Palestinian Territory and Israel - Children and Armed Conflict - 0 views

  •  
    The information below is based on the 2010 report of the Secretary-General to the Security Council (A/64/742-S/2010/181) issued on 13 April 2010. More information is available in the report. At the close of 2009, the effects of Israel's military operations in Gaza, codenamed "Operation Cast Lead", from 27 December 2008 to 18 January 2009, were still being felt across the Gaza Strip. Thousands of Gaza residents, including children, are still living in alternative or temporary accommodation and many schools, health facilities and parts of vital water and sanitation infrastructure networks have not been rehabilitated or repaired. The ongoing blockade by Israel and the resulting lack of necessary materials in Gaza make such repairs and rehabilitation difficult. A total of 374 Palestinian children were killed and 2,086 were injured during the reporting period, including at least 350 killed and 1,815 injured in Gaza alone during "Operation Cast Lead" by Israeli forces. The Israel/occupied Palestinian territory working group on grave violations against children confirmed 12 cases of Palestinian children who were killed while bearing arms and acting as combatants during "Operation Cast Lead". The working group also confirmed one case of recruitment of a 16-year-old boy by the armed group Ezz al-Din al-Qassam Brigades. The actual number of cases is believed to be higher and there had been other reported incidents of children being trained and/or used by Palestinian militant groups in Gaza. Community members are, however, reluctant to provide information on this practice.
thinkahol *

When Change Is Not Enough: The Seven Steps To Revolution | OurFuture.org - 0 views

  •  
    "Those who make peaceful evolution impossible make violent revolution inevitable."- John F. KennedyThere's one thing for sure: 2008 isn't anything like politics as usual.The corporate media (with their unerring eye for the obvious point) is fixated on the narrative that, for the first time ever, Americans will likely end this year with either a woman or a black man headed for the White House. Bloggers are telling stories from the front lines of primaries and caucuses that look like something from the early 60s - people lining up before dawn to vote in Manoa, Hawaii yesterday; a thousand black college students in Prairie View, Texas marching 10 miles to cast their early votes in the face of a county that tried to disenfranchise them. In recent months, we've also been gobstopped by the sheer passion of the insurgent campaigns of both Barack Obama and Ron Paul, both of whom brought millions of new voters into the conversation - and with them, a sharp critique of the status quo and a new energy that's agitating toward deep structural change.There's something implacable, earnest, and righteously angry in the air. And it raises all kinds of questions for burned-out Boomers and jaded Gen Xers who've been ground down to the stump by the mostly losing battles of the past 30 years. Can it be - at long last - that Americans have, simply, had enough? Are we, finally, stepping out to take back our government - and with it, control of our own future? Is this simply a shifting political season - the kind we get every 20 to 30 years - or is there something deeper going on here? Do we dare to raise our hopes that this time, we're going to finally win a few? Just how ready is this country for big, serious, forward-looking change?Recently, I came across a pocket of sociological research that suggested a tantalizing answer to these questions - and also that America may be far more ready for far more change than anyone really believes is possible at this moment. In fac
thinkahol *

AFP: UN warns of 70 percent desertification by 2025 - 0 views

  •  
    Drought could parch close to 70 percent of the planet's soil by 2025 unless countries implement policies to slow desertification, a senior United Nations official has warned. "If we cannot find a solution to this problem... in 2025, close to 70 percent could be affected," Luc Gnacadja, executive secretary of the United Nations Convention to Combat Desertification, said Friday. Drought currently affects at least 41 percent of the planet and environmental degradation has caused it to spike by 15 to 25 percent since 1990, according to a global climate report. "There will not be global security without food security" in dry regions, Gnacadja said at the start of the ninth UN conference on the convention in the Argentine capital. "A green deal is necessary" for developing countries working to combat drought, he stressed. The next meeting on the convention is scheduled to take place in South Korea in 2010.
The Ravine / Joseph Dunphy

Binyam Mohamed: The false martyr - The Long War Journal - 0 views

  •  
    This link is not an endorsement; the author is writing propaganda. What you should keep in mind as you read this post is precisely what the author would have you forget - that the victim "confessed" to the acts that supposedly justified his torture, as he was being tortured, on behalf of the US government. That part, so far, doesn't really seem to be in dispute. Only the rightness of torturing confessions out of prisoners - and then playing make believe, and pretending that those are real confessions - seems to be, leaving us to ask "didn't the Middle Ages end a few centuries ago". Don't we all basically know what history shouldn't have had to teach our ancestors - that if you inflict enough pain on somebody, he'll say just about anything to make the pain stop? To attach the word "fascism" to a political ideology that supports this sort of thing is in no way excessive, and that's why I'm linking to this article. Watch the way in which the author, with not a single fact in support of his position, blusters his way past reality, treating a torture extracted confession as a source of unimpeachable truth, and gets you to not notice that he has done so. Learn how this creep works his magic, and when the next creep comes along, you'll be less likely to fall under his spell. Oh, and yes - this is the second penis related story to come out of Africa to be seen on this microblog in a row. Nothing deliberate in this; you're just getting the stories as I find them. Wondering if this one is going to be the start of a trend. Remembering Anthropology 100 back in undergrad, and some of its more graphic descriptions of body modification rituals on the continent, I suppose that's a possibility. One I'd really rather not explore more than absolutely necessary, but when somebody ends up being held prisoner and tortured for seven years because he visited a parody site, I think we need to get past our squeamishness and say something about that.
thinkahol *

United States v. Dougherty - Wikipedia, the free encyclopedia - 0 views

  •  
    United States v. Dougherty was a 1972 decision by the United States Court of Appeals for the District of Columbia in which the court ruled that members of the D.C. Nine, who had broken into Dow Chemical Company, vandalized office furniture and equipment, and spilled about a bloodlike substance, were not entitled to a new trial on the basis of the judge's failing to allow a jury nullification jury instruction. The Appeals Court ruled, by a 2-1 vote: " The fact that there is widespread existence of the jury's prerogative, and approval of its existence as a "necessary counter to casehardened judges and arbitrary prosecutors," does not establish as an imperative that the jury must be informed by the judge of that power. On the contrary, it is pragmatically useful to structure instructions in such wise that the jury must feel strongly about the values involved in the case, so strongly that it must itself identify the case as establishing a call of high conscience, and must independently initiate and undertake an act in contravention of the established instructions. This requirement of independent jury conception confines the happening of the lawless jury to the occasional instance that does not violate, and viewed as an exception may even enhance, the over-all normative effect of the rule of law. An explicit instruction to a jury conveys an implied approval that runs the risk of degrading the legal structure requisite for true freedom, for an ordered liberty that protects against anarchy as well as tyranny. " Nonetheless, the defendants were given a new trial on the grounds that they had been denied their right of self-representation.[1] The Circuit Judges' assumption that jurors know about their nullification prerogative has since been brought into question by other empirical evidence.[2] According to Irwin Horowitz, "Beyond the empirical issue, lack of nullification instructions maintains a deceit. After all, juries can nullify, but they know this fact only on a so
thinkahol *

Occupy Wall Street: Washington Still Doesn't Get It | Matt Taibbi | Rolling Stone - 0 views

  •  
    I'll have more coming out about this in a few days, but there have been two disgusting developments in the realm of plutocratic intervention on behalf of Wall Street that everyone protesting should take note of. The fact that both of the following things took place in the middle of the full fever of OWS, when everyone is supposedly trying to placate anti-banker sentiment and Obama and the DCCC are supposedly pledging support of the protesters, shows how completely bankrupt this system is and how necessary street-level protests have become. Popular uprising is probably the only move left to stop developments like the following:
funeral adelaide

The Most Reliable Funeral Service - 1 views

It is not really easy to experience death in the family. And as I try to recall my mom's death last year, I could truly say that if it was not because of the help of Sensible Funerals things could ...

started by funeral adelaide on 18 Dec 12 no follow-up yet
Arabica Robusta

West 86th - The Administration of Things: A Genealogy - 0 views

  • “If men never disagreed about the ends of life, if our ancestors had remained undisturbed in the Garden of Eden, the studies to which the Chichele Chair of Social and Political Theory is dedicated could scarcely have been conceived,” Isaiah Berlin told his audience at Oxford when he assumed that position in 1958. Philosophy was at its best when it was being contentious, especially when it was being contentious about the meaning and purpose of our common existence. Too much agreement was an abdication of its ethical responsibility
  • The task of philosophy was not to settle disputes, but to unsettle them, to encourage them, to keep them going. For it was only through disputation that we could resist the rule of experts and machines, the bureaucratic-technocratic society foretold by Saint-Simon and championed by Marx and Engels, a society in which we replace the “government of persons by the administration of things.”
  • Louis de Bonald pointed to the hard choices that the state would have to make. “In the modern state, we have perfected the administration of things at the expense of the administration of men, and we are far more preoccupied with the material than the moral,” he wrote. “Few governments nurture religion or morality with the same attention that they promote commerce, open communications, keep track of accounts, provide the people with pleasures, etc.” 12
  • ...6 more annotations...
  • All history, Comte argued, is a history of class struggle. Not the struggle between master and slave, lord and serf, bourgeois and proletarian—that was still a couple decades away—but the struggle between two classes of phenomena: “critical” phenomena that contributed to moral and political decay and “organic” phenomena that promoted individual and social regeneration.
  • The objective was to protect against arbitrariness in all of its manifestation. Earlier political thinkers had tended to associate arbitrariness mainly with absolutist governments, but for Comte any form of government was susceptible so long as it rested on “metaphysical” rather than “positive” principles.
  • Engels believed that the obsession with detail that had characterized utopian socialism—its compulsion to work out every last aspect of future social organization—is precisely what made it so utopian.
  • When, at last, it becomes the real representative of the whole of society, it renders itself unnecessary. As soon as there is no longer any social class to be held in subjection; as soon as class rule, and the individual struggle for existence based upon our present anarchy in production, with the collisions and excesses arising from these, are removed, nothing more remains to be repressed, and a special repressive force, a State, is no longer necessary.
  • “I think it was Trotsky who used a very plain but very telling metaphor,” the historian Isaac Deutscher told graduate students in a seminar on bureaucracy at the London School of Economics in 1960. “The policeman can use his baton either for regulating traffic or for dispersing a demonstration of strikers or unemployed. In this one sentence is summed up the classical distinction between administration of things and administration of men.”
  • Our hasty genealogy of the “administration of things” must conclude with its latest, and quite possibly last, iteration: Bruno Latour’s “Parliament of Things,” or Dingpolitik. Initially proposed in his book We Have Never Been Modern (1991), then extended in a massive exhibition and accompanying catalog, Making Things Public (2005), Latour’s program has attracted a growing number of partisans in the world of political theory
Skeptical Debunker

Leaked intelligence documents: Here's what Facebook and Comcast will tell the police ab... - 0 views

  • The "Facebook Subpoena/Search Warrant Guidelines" from the Cryptome site are dated 2008, so there's a chance they've been superseded. The document spells out how law enforcement and intelligence agenices should go about requesting information about Facebook users, and details what information is turned over. Following is what Facebook will turn over about you, taken verbatim from the guide: Types of Information Available User Neoprint The Neoprint is an expanded view of a given user profile. A request should specify that they are requesting a “Neoprint of used Id XXXXXX”. User Photoprint The Photoprint is a compilation of all photos uploaded by the user that have not been deleted, along with all photos uploaded by any user which have the requested user tagged in them. A request should specify that they are requesting a “Photoprint of user Id XXXXXX”. User Contact Info All user contact information input by the user and not subsequently deleted by the user is available, regardless of whether it is visible in their profile. This information may include the following: Name Birth date Contact e-mail address(s) Physical address City State Zip Phone Cell Work phone Screen name (usually for AOL Messenger/iChat) Website With the exception of contact e-mail and activated mobile numbers, Facebook validates none of this information. A request should specify that they are requesting "Contact information of user specified by [some other piece of contact information]". No historical data is retained. Group Contact Info Where a group is known, we will provide a list of users currently registered in a group. We will also provide a PDF of the current status of the group profile page. A request should specify that they are requesting "Contact information for group XXXXXX". No historical data is retained. IP Logs IP logs can be produced for a given user ID or IP address. A request should specify that they are requesting the "IP log of user Id XXXXXX" or "IP log of IP address xxx.xxx.xxx.xxx". The log contains the following information: * Script – script executed. For instance, a profile view of the URL http://www.facebook.com/profile.php?id=29445421 would populate script with "profile.php" * Scriptget – additional information passed to the script. In the above example, scriptget would contain "id=29445421" * Userid – The Facebook user id of the account active for the request * View time – date of execution in Pacific Time * IP – source IP address IP log data is generally retained for 90 days from present date. However, this data source is under active and major redevelopment and data may be retained for a longer or shorter period. Special Requests The Facebook Security Team may be able to retrieve specific information not addressed in the general categories above. Please contact Facebook if you have a specific investigative need prior to issuing a subpoena or warrant.
  • Comcast The Comcast document is labeled "Comcast Cable Law Enforcement Handbook," and is dated 2007, so there's a possibility that it, too, has been superseded. As with the other documents, it explains how law enforcement agenices can get information, and details what information is available. There's a great deal of detail in the 35-page document, which describes what Internet, phone, and television information will be turned over. For example, here's the IP information it will make available: Comcast currently maintains Internet Protocol address log files for a period of 180 days. If Comcast is asked to respond for information relating to an incident that occurred beyond this period, we will not have responsive information and can not fulfill a legal request. (Comcast can process and respond to preservation requests as outlined below in this Handbook.) As expected, Comcast will also turn over the emails, including attachments, of those who use Comcast's email service, but "In cases involving another entity’s email service or account, Comcast would not have any access to or ability to access customer email in response to a legal request." Information Comcast turns over to law enforcement agencies varies according to the request. For example, a grand jury subpoena will yield more information than a judicial summons, as you can see in the excerpt below. Comcast notes, though, that this is just a sample, and that "Each request is evaluated and reviewed on a case by case basis in light of any special procedural or legal requirements and applicable laws." So the examples "are for illustration only."
  • For those who worry about privacy, though, all of this information is small potatoes. The real worry is about the use of what are called pen registers or trap-and-trace devices, which essentially capture all of your Internet activity --- the Web sites you visits, the emails you send and receive, IM traffic, downloads, and so on. Here's what the document says about them: Pen Register / Trap and Trace Device Title 18 U.S.C. § 3123 provides a mechanism for authorizing and approving the installation and use of a pen register or a trap and trace device pursuant to court order. All orders must be coordinated prior to submission to Comcast. Law enforcement will be asked to agree to reimburse Comcast's reasonable costs incurred to purchase and/or install and monitor necessary equipment. See "Reimbursement," below.
  • ...2 more annotations...
  • As for your voice calls made via Comcast, here's what the company will turn over: Call Detail Records - Comcast maintains two years of historical call detail records (records of local and long distance connections) for our Comcast Digital Voice telephone service. This includes local, local toll, and long distance records. Comcast also currently provides traditional circuit-switched telephone service branded Comcast Digital Phone. Call detail records for this service are collected by AT&T and are available for approximately two years as well. To determine which type of service is involved, contact the Legal Demands Center—Voice and Video at 800-871-6298. Account Records - Account records are generally stored for approximately two years after the termination of an account. If the account has an outstanding balance due, records may be retained for a longer period of time. As with Internet information, what phone information will be turned over depends on the specific kind of legal request, and the examples "are for information only." Here's an excerpt:
  • And, as you would expect, there is the same pen register/trap-and-trace device language as in the section about the Internet. Oddly enough, it appears that when it comes to information about your television viewing habits, you have more privacy rights than you do when it comes to information about your Internet and voice use, because it can only be turned over in response to a court order, not a subpoena. Here's what the document has to say about TV information: Subscriber Account Identification and Related Records For subscribers to our cable television service, the Cable Act requires Comcast as a cable operator to disclose personally identifiable information to a governmental entity solely in response to a court order (and not, for example, a subpoena) or with the subscriber's express written consent. The Cable Act requires that the cable subscriber be afforded the opportunity to appear and contest in a court proceeding relevant to the court order any claims made in support of the court order. At the proceeding, the Cable Act requires the governmental entity to offer clear and convincing evidence that the subject of the information is reasonably suspected of engaging in criminal activity and that the information sought would be material evidence in the case. See 47 U.S.C. § 551(h). Why does the law give you more privacy protection over your television viewing habits than your Internet or phone use? I haven't a clue --- ask your congressman.
  •  
    Wonder what information Facebook and Comcast will turn over to police and intelligence agencies about you? Cryptome, the site that last week posted the leaked Microsoft "spy" manual, has posted company documents that purport to describe what those companies will reveal about you. As with the Microsoft document, the information is eye-opening.
1 - 20 of 26 Next ›
Showing 20 items per page