Skip to main content

Home/ Politically Minded/ Group items tagged Screens

Rss Feed Group items tagged

thinkahol *

America's Secret Empire of Drone Bases - 0 views

  •  
    They increasingly dot the planet.  There's a facility outside Las Vegas where "pilots" work in climate-controlled trailers, another at a dusty camp in Africa formerly used by the French Foreign Legion, a third at a big air base in Afghanistan where Air Force personnel sit in front of multiple computer screens, and a fourth at an air base in the United Arab Emirates that almost no one talks about. And that leaves at least 56 more such facilities to mention in an expanding American empire of unmanned drone bases being set up worldwide.  Despite frequent news reports on the drone assassination campaign launched in support of America's ever-widening undeclared wars and a spate of stories on drone bases in Africa and the Middle East, most of these facilities have remained unnoted, uncounted, and remarkably anonymous - until now. Run by the military, the Central Intelligence Agency, and their proxies, these bases - some little more than desolate airstrips, others sophisticated command and control centers filled with computer screens and high-tech electronic equipment - are the backbone of a new American robotic way of war.  They are also the latest development in a long-evolving saga of American power projection abroad - in this case, remote-controlled strikes anywhere on the planet with a minimal foreign "footprint" and little accountability.Using military documents, press accounts, and other open source information, an in-depth analysis by TomDispatch has identified at least 60 bases integral to U.S. military and CIA drone operations.  There may, however, be more, since a cloak of secrecy about drone warfare leaves the full size and scope of these bases distinctly in the shadows.
thinkahol *

Chris Hedges: Retribution for a World Lost in Screens - Chris Hedges' Columns - Truthdig - 0 views

  •  
    Like the Ancients, we arrogant humans who turn ourselves into objects of worship and build ruthless systems of power to control the world around us will get what we are due.  - 2010/09/27
thinkahol *

Politics and eye movement: Liberals focus their attention on 'gaze cues' much different... - 0 views

  •  
    In a new study, researchers measured both liberals' and conservatives' reaction to "gaze cues" -- a person's tendency to shift attention in a direction consistent with another person's eye movements. Liberals responded strongly to the prompts, consistently moving their attention in the direction suggested to them by a face on a computer screen. Conservatives, on the other hand, did not
The Ravine / Joseph Dunphy

The Memory Hole > The 9/11 Artwork the Public Isn't Allowed to See - 0 views

  •  
    "Eric Fischl ... created this bronze sculpture of a woman plummeting to her death, basing it on the many people who did just that during the 9/11 attacks ... ... Immediately, members of the public began complaining about the upsetting nature of the piece, and administrators at the center quickly covered it in cloth and hid it behind a screen." Right, because we wouldn't want to make mass murder look like something horrible? Watching policy getting made to appease those who don't get the point.
Fay Paxton

The Politics of Reproductive Healthcare |The Political Pragmatic - 0 views

  •  
    Since the 2010 elections, according to the Guttmacher Institute, Republican legislators have introduced more than 2,000 bills related to women's reproductive healthcare. The assault on women's health and freedom denies millions of women access to affordable contraception, life-saving cancer screenings, testing for H.I.V. and other sexually transmitted diseases. Some laws call for measures as drastic as imprisonment. In 2013, National Advocates for Pregnant Women, published the results of a study that examined cases in which a woman's pregnancy led to arrests and incarceration, detentions in hospitals, mental institutions, and forced medical interventions. The summary of some cases follows:
Levy Rivers

Obama the Delegator Picks When to Take Reins - NYTimes.com - 0 views

  • He does not stir dissent simply for dissent’s sake, but often employs a Socratic method of discussion, where aides put ideas forward for him to accept or reject. Advisers described his meetings as “un-Clintonesque,” a reference to the often meandering, if engrossing, policy discussions Bill Clinton presided over when he was president.
  • But Mr. Obama’s ease belies a more controlling management style. For all the success his campaign has enjoyed with grass-roots organizing, the operation is highly centralized around Mr. Axelrod; David Plouffe, the campaign manager; Robert Gibbs, the communications director; Pete Rouse, his Senate chief of staff; Valerie Jarrett, a longtime friend from Chicago; and a handful of senior advisers that has barely changed since he opened his campaign in January 2007.
  • Mr. Obama’s circle of advisers takes seriously his “no drama” mandate. It is a point of pride in his campaign that there have been virtually no serious leaks to the news media — small leaks are immediately investigated — about internal division or infighting. He is a careful reader of daily newspapers and magazines (titles from Foreign Affairs to Maxim are stocked on his campaign plane). He takes his briefing books — three-ring binders filled with political memorandums and policy discussions — to his hotel room or home every night, but aides say how well he reads the materials may depend on what is on ESPN.
  • ...1 more annotation...
  • “He’ll say, ‘that is not my voice,’ ” said Jim Margolis, a senior media consultant to Mr. Obama who oversees television advertising. “Definitely this isn’t somebody you just throw the script to and he’ll say anything that comes up on the screen. He tries to make sure that he’s got his imprint on it.”
Skeptical Debunker

Leaked intelligence documents: Here's what Facebook and Comcast will tell the police ab... - 0 views

  • The "Facebook Subpoena/Search Warrant Guidelines" from the Cryptome site are dated 2008, so there's a chance they've been superseded. The document spells out how law enforcement and intelligence agenices should go about requesting information about Facebook users, and details what information is turned over. Following is what Facebook will turn over about you, taken verbatim from the guide: Types of Information Available User Neoprint The Neoprint is an expanded view of a given user profile. A request should specify that they are requesting a “Neoprint of used Id XXXXXX”. User Photoprint The Photoprint is a compilation of all photos uploaded by the user that have not been deleted, along with all photos uploaded by any user which have the requested user tagged in them. A request should specify that they are requesting a “Photoprint of user Id XXXXXX”. User Contact Info All user contact information input by the user and not subsequently deleted by the user is available, regardless of whether it is visible in their profile. This information may include the following: Name Birth date Contact e-mail address(s) Physical address City State Zip Phone Cell Work phone Screen name (usually for AOL Messenger/iChat) Website With the exception of contact e-mail and activated mobile numbers, Facebook validates none of this information. A request should specify that they are requesting "Contact information of user specified by [some other piece of contact information]". No historical data is retained. Group Contact Info Where a group is known, we will provide a list of users currently registered in a group. We will also provide a PDF of the current status of the group profile page. A request should specify that they are requesting "Contact information for group XXXXXX". No historical data is retained. IP Logs IP logs can be produced for a given user ID or IP address. A request should specify that they are requesting the "IP log of user Id XXXXXX" or "IP log of IP address xxx.xxx.xxx.xxx". The log contains the following information: * Script – script executed. For instance, a profile view of the URL http://www.facebook.com/profile.php?id=29445421 would populate script with "profile.php" * Scriptget – additional information passed to the script. In the above example, scriptget would contain "id=29445421" * Userid – The Facebook user id of the account active for the request * View time – date of execution in Pacific Time * IP – source IP address IP log data is generally retained for 90 days from present date. However, this data source is under active and major redevelopment and data may be retained for a longer or shorter period. Special Requests The Facebook Security Team may be able to retrieve specific information not addressed in the general categories above. Please contact Facebook if you have a specific investigative need prior to issuing a subpoena or warrant.
  • Comcast The Comcast document is labeled "Comcast Cable Law Enforcement Handbook," and is dated 2007, so there's a possibility that it, too, has been superseded. As with the other documents, it explains how law enforcement agenices can get information, and details what information is available. There's a great deal of detail in the 35-page document, which describes what Internet, phone, and television information will be turned over. For example, here's the IP information it will make available: Comcast currently maintains Internet Protocol address log files for a period of 180 days. If Comcast is asked to respond for information relating to an incident that occurred beyond this period, we will not have responsive information and can not fulfill a legal request. (Comcast can process and respond to preservation requests as outlined below in this Handbook.) As expected, Comcast will also turn over the emails, including attachments, of those who use Comcast's email service, but "In cases involving another entity’s email service or account, Comcast would not have any access to or ability to access customer email in response to a legal request." Information Comcast turns over to law enforcement agencies varies according to the request. For example, a grand jury subpoena will yield more information than a judicial summons, as you can see in the excerpt below. Comcast notes, though, that this is just a sample, and that "Each request is evaluated and reviewed on a case by case basis in light of any special procedural or legal requirements and applicable laws." So the examples "are for illustration only."
  • For those who worry about privacy, though, all of this information is small potatoes. The real worry is about the use of what are called pen registers or trap-and-trace devices, which essentially capture all of your Internet activity --- the Web sites you visits, the emails you send and receive, IM traffic, downloads, and so on. Here's what the document says about them: Pen Register / Trap and Trace Device Title 18 U.S.C. § 3123 provides a mechanism for authorizing and approving the installation and use of a pen register or a trap and trace device pursuant to court order. All orders must be coordinated prior to submission to Comcast. Law enforcement will be asked to agree to reimburse Comcast's reasonable costs incurred to purchase and/or install and monitor necessary equipment. See "Reimbursement," below.
  • ...2 more annotations...
  • As for your voice calls made via Comcast, here's what the company will turn over: Call Detail Records - Comcast maintains two years of historical call detail records (records of local and long distance connections) for our Comcast Digital Voice telephone service. This includes local, local toll, and long distance records. Comcast also currently provides traditional circuit-switched telephone service branded Comcast Digital Phone. Call detail records for this service are collected by AT&T and are available for approximately two years as well. To determine which type of service is involved, contact the Legal Demands Center—Voice and Video at 800-871-6298. Account Records - Account records are generally stored for approximately two years after the termination of an account. If the account has an outstanding balance due, records may be retained for a longer period of time. As with Internet information, what phone information will be turned over depends on the specific kind of legal request, and the examples "are for information only." Here's an excerpt:
  • And, as you would expect, there is the same pen register/trap-and-trace device language as in the section about the Internet. Oddly enough, it appears that when it comes to information about your television viewing habits, you have more privacy rights than you do when it comes to information about your Internet and voice use, because it can only be turned over in response to a court order, not a subpoena. Here's what the document has to say about TV information: Subscriber Account Identification and Related Records For subscribers to our cable television service, the Cable Act requires Comcast as a cable operator to disclose personally identifiable information to a governmental entity solely in response to a court order (and not, for example, a subpoena) or with the subscriber's express written consent. The Cable Act requires that the cable subscriber be afforded the opportunity to appear and contest in a court proceeding relevant to the court order any claims made in support of the court order. At the proceeding, the Cable Act requires the governmental entity to offer clear and convincing evidence that the subject of the information is reasonably suspected of engaging in criminal activity and that the information sought would be material evidence in the case. See 47 U.S.C. § 551(h). Why does the law give you more privacy protection over your television viewing habits than your Internet or phone use? I haven't a clue --- ask your congressman.
  •  
    Wonder what information Facebook and Comcast will turn over to police and intelligence agencies about you? Cryptome, the site that last week posted the leaked Microsoft "spy" manual, has posted company documents that purport to describe what those companies will reveal about you. As with the Microsoft document, the information is eye-opening.
1 - 7 of 7
Showing 20 items per page