Skip to main content

Home/ Politically Minded/ Group items tagged Order

Rss Feed Group items tagged

Fay Paxton

Moving Forward with Executive Orders |The Political Pragmatic - 0 views

  •  
    When Congress is unable to agree on how to implement a law or program, it leaves an opening for the President to take over, in the form of an Executive Order. I wanted to look back and see how past Presidents have used Executive Orders. This is what I found:
Skeptical Debunker

Leaked intelligence documents: Here's what Facebook and Comcast will tell the police ab... - 0 views

  • The "Facebook Subpoena/Search Warrant Guidelines" from the Cryptome site are dated 2008, so there's a chance they've been superseded. The document spells out how law enforcement and intelligence agenices should go about requesting information about Facebook users, and details what information is turned over. Following is what Facebook will turn over about you, taken verbatim from the guide: Types of Information Available User Neoprint The Neoprint is an expanded view of a given user profile. A request should specify that they are requesting a “Neoprint of used Id XXXXXX”. User Photoprint The Photoprint is a compilation of all photos uploaded by the user that have not been deleted, along with all photos uploaded by any user which have the requested user tagged in them. A request should specify that they are requesting a “Photoprint of user Id XXXXXX”. User Contact Info All user contact information input by the user and not subsequently deleted by the user is available, regardless of whether it is visible in their profile. This information may include the following: Name Birth date Contact e-mail address(s) Physical address City State Zip Phone Cell Work phone Screen name (usually for AOL Messenger/iChat) Website With the exception of contact e-mail and activated mobile numbers, Facebook validates none of this information. A request should specify that they are requesting "Contact information of user specified by [some other piece of contact information]". No historical data is retained. Group Contact Info Where a group is known, we will provide a list of users currently registered in a group. We will also provide a PDF of the current status of the group profile page. A request should specify that they are requesting "Contact information for group XXXXXX". No historical data is retained. IP Logs IP logs can be produced for a given user ID or IP address. A request should specify that they are requesting the "IP log of user Id XXXXXX" or "IP log of IP address xxx.xxx.xxx.xxx". The log contains the following information: * Script – script executed. For instance, a profile view of the URL http://www.facebook.com/profile.php?id=29445421 would populate script with "profile.php" * Scriptget – additional information passed to the script. In the above example, scriptget would contain "id=29445421" * Userid – The Facebook user id of the account active for the request * View time – date of execution in Pacific Time * IP – source IP address IP log data is generally retained for 90 days from present date. However, this data source is under active and major redevelopment and data may be retained for a longer or shorter period. Special Requests The Facebook Security Team may be able to retrieve specific information not addressed in the general categories above. Please contact Facebook if you have a specific investigative need prior to issuing a subpoena or warrant.
  • Comcast The Comcast document is labeled "Comcast Cable Law Enforcement Handbook," and is dated 2007, so there's a possibility that it, too, has been superseded. As with the other documents, it explains how law enforcement agenices can get information, and details what information is available. There's a great deal of detail in the 35-page document, which describes what Internet, phone, and television information will be turned over. For example, here's the IP information it will make available: Comcast currently maintains Internet Protocol address log files for a period of 180 days. If Comcast is asked to respond for information relating to an incident that occurred beyond this period, we will not have responsive information and can not fulfill a legal request. (Comcast can process and respond to preservation requests as outlined below in this Handbook.) As expected, Comcast will also turn over the emails, including attachments, of those who use Comcast's email service, but "In cases involving another entity’s email service or account, Comcast would not have any access to or ability to access customer email in response to a legal request." Information Comcast turns over to law enforcement agencies varies according to the request. For example, a grand jury subpoena will yield more information than a judicial summons, as you can see in the excerpt below. Comcast notes, though, that this is just a sample, and that "Each request is evaluated and reviewed on a case by case basis in light of any special procedural or legal requirements and applicable laws." So the examples "are for illustration only."
  • For those who worry about privacy, though, all of this information is small potatoes. The real worry is about the use of what are called pen registers or trap-and-trace devices, which essentially capture all of your Internet activity --- the Web sites you visits, the emails you send and receive, IM traffic, downloads, and so on. Here's what the document says about them: Pen Register / Trap and Trace Device Title 18 U.S.C. § 3123 provides a mechanism for authorizing and approving the installation and use of a pen register or a trap and trace device pursuant to court order. All orders must be coordinated prior to submission to Comcast. Law enforcement will be asked to agree to reimburse Comcast's reasonable costs incurred to purchase and/or install and monitor necessary equipment. See "Reimbursement," below.
  • ...2 more annotations...
  • As for your voice calls made via Comcast, here's what the company will turn over: Call Detail Records - Comcast maintains two years of historical call detail records (records of local and long distance connections) for our Comcast Digital Voice telephone service. This includes local, local toll, and long distance records. Comcast also currently provides traditional circuit-switched telephone service branded Comcast Digital Phone. Call detail records for this service are collected by AT&T and are available for approximately two years as well. To determine which type of service is involved, contact the Legal Demands Center—Voice and Video at 800-871-6298. Account Records - Account records are generally stored for approximately two years after the termination of an account. If the account has an outstanding balance due, records may be retained for a longer period of time. As with Internet information, what phone information will be turned over depends on the specific kind of legal request, and the examples "are for information only." Here's an excerpt:
  • And, as you would expect, there is the same pen register/trap-and-trace device language as in the section about the Internet. Oddly enough, it appears that when it comes to information about your television viewing habits, you have more privacy rights than you do when it comes to information about your Internet and voice use, because it can only be turned over in response to a court order, not a subpoena. Here's what the document has to say about TV information: Subscriber Account Identification and Related Records For subscribers to our cable television service, the Cable Act requires Comcast as a cable operator to disclose personally identifiable information to a governmental entity solely in response to a court order (and not, for example, a subpoena) or with the subscriber's express written consent. The Cable Act requires that the cable subscriber be afforded the opportunity to appear and contest in a court proceeding relevant to the court order any claims made in support of the court order. At the proceeding, the Cable Act requires the governmental entity to offer clear and convincing evidence that the subject of the information is reasonably suspected of engaging in criminal activity and that the information sought would be material evidence in the case. See 47 U.S.C. § 551(h). Why does the law give you more privacy protection over your television viewing habits than your Internet or phone use? I haven't a clue --- ask your congressman.
  •  
    Wonder what information Facebook and Comcast will turn over to police and intelligence agencies about you? Cryptome, the site that last week posted the leaked Microsoft "spy" manual, has posted company documents that purport to describe what those companies will reveal about you. As with the Microsoft document, the information is eye-opening.
thinkahol *

Startling revelations from a Swiss banking insider | Dailycensored.com - 0 views

  •  
    (interview with a Swiss banker  done in Mosсow 30.05.2011)  Q: Can you tell us something about your involvement in the Swiss banking business?A: I have worked for Swiss banks for many years. I was designated as one of the top directors of one of the biggest Swiss banks. During my work I was involved in the payment, in the direct payment in cash to a person who killed the president of a foreign country. I was in the meeting where it was decided to give this cash money to the killer. This gave me dramatic headaches and troubled my conscience. It was not the only case that was really bad but it was the worst. It was a payment instruction on order of a foreign secret service written by hand giving the order to pay a certain amount to a person who killed the top leader of a foreign country. And it was not the only case. We received several such hand written letters coming from foreign secret services giving the order to payout cash from secret accounts to fund revolutions or for the killing of people. I can confirm what John Perkins has written in his book "Confessions of an Economic Hit Man". There really exists just a system and Swiss banks are involved in such cases.
thinkahol *

U.S. Chamber To Rank Politicians On Whether They Vote To Keep Contractor Donations Secr... - 0 views

  •  
    The U.S. Chamber of Commerce has written a letter to members of the House telling them that voting for federal contractors to be more transparent about their political spending will negatively impact their legislative scorecard. "The U.S. Chamber of Commerce strongly supports legislative proposals to ensure that political spending -- or the lack thereof -- continues to play no role in federal contracting decisions," the Chamber's R. Bruce Josten wrote in the letter sent on Wednesday. "Therefore, the Chamber supports amendments that have been offered by Rep. Cole to several Fiscal Year 2012 appropriations bills considered by the full House, and any similar amendments should they be offered to the remaining FY 2012 appropriations bills," he wrote. Meanwhile, more than sixty members of the House signed a letter sent to the White House by Rep. Anna G. Eshoo (D-CA) which expressed strong support for a draft executive order which would require companies that get taxpayer dollars to disclose their political expenditures. Disclosure, the letter says, "will not politicize the procurement process -- it will improve it." "Political expenditures are already well-known to those that make them and to the officials who benefit," the letter states. "With disclosure, the public will have access to this information as well, allowing them to judge whether contracts were awarded based on merit. A meritorious procurement system is the only responsible use of taxpayer money, making this a deficit reduction effort as much as a campaign finance reform issue." Both the Chamber and House Republicans have argued that the proposed executive order -- first leaked in April -- is a plot by the Obama administration to silence political opponents. Supporters of the measure have said the executive order -- by bringing donations out into the open -- would actually discourage federal contracting officials from doing favors for contractors based on their donations to third-party political groups
Fay Paxton

The Political Pragmatic - 0 views

  •  
    When Congress is unable to agree on how to implement a law or program, it leaves an opening for the President to take over, in the form of an Executive Order. I wanted to look back and see how past Presidents have used Executive Orders. This is what I found:
Muslim Academy

Islamic education Importance and sources - 0 views

  •  
    Islamic education is important to act like a complete Muslim. There are many sources which could be used for getting education in Islam. Muslims must have proper information about Islam in order to act on its teachings in an effective manner. There are many sources these days which could be used in order to get education about Islam. This education will clear many points about Islam and the users would be able to compare Islam with many other religions. There are many religions which are followed by different people in different parts of the world. Islamic education is important for spreading Islam in an effective manner. After getting education in Islam it could be compared with other religions for making a good decision. There are many types of facilities in Islam which are helpful for the followers.
thinkahol *

To Occupy and Rise - 0 views

shared by thinkahol * on 30 Sep 11 - No Cached
  •  
    The Occupy Wall Street movement is well into its second week of operation, and is now getting more attention from media as well as from people planning similar actions across the country. This is a promising populist mobilization with a clear message against domination by political and economic elites. Against visions of a bleak and stagnant future, the occupiers assert the optimism that a better world can be made in the streets. They have not resigned themselves to an order where the young are presented with a foreseeable future of some combination of debt, economic dependency, and being paid little to endure constant disrespect, an order that tells the old to accept broken promises and be glad to just keep putting in hours until they can't work anymore. The occupiers have not accepted that living in modern society means shutting up about how it functions. In general, the occupiers see themselves as having more to gain than to lose in creating a new political situation - something that few who run the current system will help deliver. They are not eager for violence, and have shown admirable restraint in the face of attack by police. There may be no single clear agenda, but there is a clear message: that people will have a say in their political and economic lives, regardless of what those in charge want. Occupy Wall Street is a kind of protest that Americans are not accustomed to seeing. There was no permit to protest, and it has been able to keep going on through unofficial understandings between protestors and police. It is not run by professional politicians, astroturfers, or front groups with barely-hidden agendas. Though some organizations and political figures have promoted it, Occupy Wall Street is not driven by any political party or protest organization. It is a kind of protest that shows people have power when they are determined to use it. Occupy Wall Street could be characterized as an example of a new type of mass politics, which has been seen in
thinkahol *

The Legacy of the Lodges: Mutual Aid and Consumer Society - 0 views

  •  
    The basic purpose of the orders was to enable working people to pool their financial resources to supply each other with essentials that the state and the capitalists would not, including life insurance, pensions, cradle-to-grave medical care, and homes and schools for destitute family members. Members paid dues, usually modest, to support these services, which sometimes included their own hospitals, clinics, orphanages, and schools. And unlike private employers, the orders fought hard and usually succeeded in keeping their promises to their members even when times were bad.
Joe La Fleur

Obamas NEW Dictatorship Executive Order | Obama - 0 views

  •  
    WHAT WILL YOU DO WHEN YOU HAVE LOST ALL OF YOUR LIBERTY AND YOU CAN'T VOTE HIM OUT? LIBERAL DEMOCRATS LOST IN THE WONDER OF THEIR MESSAIH WILL NEVER NOTICE!
Joe La Fleur

The Senate's first order of business: Polar bear carcasses « Hot Air - 0 views

  •  
    DEMOCRAT CONTROLLED SENATE SAYS DAM THE ECONOMY AND DEAD AMERICANS IN BENGHAZI
Joe La Fleur

Agenda 21- Codex- Fema Camps-80% Depopulation = New World Order (Terror Camps: The Glob... - 0 views

  •  
    AGENDA 21
Joe La Fleur

Libyan Attack Was A Botched Kidnapping Attempt Ordered By OBAMA! - 0 views

  •  
    BENGHAZI WAS BOTCHED KIDNAPPING ATTEMPT THATS WHY MILITARY WAS TOLD TO STAND DOWN.
Muslim Academy

The Arabic as Muslim language - 0 views

  •  
    Arabic is considered as Muslim language in many parts of the world. Teachings of Islam are issued in Arabic and many people are learning this language for getting the main information about Islam in an effective manner. In order to live and work in a Muslim country it is important to learn language of that country. In many Muslim countries Arabic is a main language. People are communicating in Arabic and doing dealings through this language. If you are willing to visit a Muslim country in which Arabic is a main language then you must learn that Muslim language. Those people who are visiting to Muslim countries can learn Arabic in an effective manner as there is a good atmosphere for them. It is good to learn Arabic before visiting such country in which Arabic is a main language. There are many sources of learning Arabic. There are online courses which could be used for learning Arabic in an effective manner. Academies are offering language courses for those who are willing to learn Arabic.
thinkahol *

Armed Chinese Troops in Texas! - YouTube - 0 views

  •  
    NOTE: It is important to separate hunting down terrorists who attack our country and deserve justice (which Ron Paul is 100% for), and not confuse justice with occupying entire countries for a decade under the guise of the "War on Terror" or "Spreading Democracy". Terrorists are individuals and small groups, so why are we picking fights with entire nations? BILLIONS for Defense, NOT A PENNY for Empire. This speech is called "Imagine" and it was given by Ron Paul on March 11, 2009. The original text of the talk is below: Imagine for a moment that somewhere in the middle of Texas there was a large foreign military base, say Chinese or Russian. Imagine that thousands of armed foreign troops were constantly patrolling American streets in military vehicles. Imagine they were here under the auspices of "keeping us safe" or "promoting democracy" or "protecting their strategic interests." Imagine that they operated outside of US law, and that the Constitution did not apply to them. Imagine that every now and then they made mistakes or acted on bad information and accidentally killed or terrorized innocent Americans, including women and children, most of the time with little to no repercussions or consequences. Imagine that they set up checkpoints on our soil and routinely searched and ransacked entire neighborhoods of homes. Imagine if Americans were fearful of these foreign troops, and overwhelmingly thought America would be better off without their presence. Imagine if some Americans were so angry about them being in Texas that they actually joined together to fight them off, in defense of our soil and sovereignty, because leadership in government refused or were unable to do so. Imagine that those Americans were labeled terrorists or insurgents for their defensive actions, and routinely killed, or captured and tortured by the foreign troops on our land. Imagine that the occupiers' attitude was that if they just killed enough Americans, the resistance would stop, but inst
1 - 20 of 81 Next › Last »
Showing 20 items per page