Skip to main content

Home/ Politically Minded/ Group items tagged Team

Rss Feed Group items tagged

Levy Rivers

Black Power Brokers Ready to Rise In Tandem With New President - WSJ.com - 0 views

  • Seated in his office recently, Mr. Johnson casually pulled out a list that's been circulating over the Internet of rumored Obama cabinet picks. Next to his name was the title secretary of labor. "I was flattered," said Mr. Johnson, before dismissing the speculative document with a laugh. "I am part of the Obama team and I'd want that to continue -- if asked."
  • Being known as a top fund-raiser or adviser to Mr. Obama has given African-Americans "the opportunity to build wonderful relationships," says John Rogers, the 50-year-old founder of Chicago-based Ariel Capital Management who has known the president-elect for years.
  • Of those hoping for access and government stints, some may be disappointed. Loyalties aside, Mr. Obama, according to people familiar with his thinking, may be constrained in the number of blacks he appoints to avoid any charges of favoring African-Americans.
  • ...4 more annotations...
  • "There is no one who represents the black inner city, who is rooted in the black community," says the Rev. Eugene Rivers, an influential black Boston minister. "It's the whole black Brahmin thing: Vote for us because we're better than you."
  • But now, the spotlight has shifted to a new cadre of African-Americans in their 40s and 50s. Their growing visibility is already changing the tone of Washington and creating new power matrixes. For example, Eric Holder -- who helped conduct Mr. Obama's search for a vice president and is considered by people close to the campaign as a candidate for attorney general
  • When Mr. Obama first ran for office in Chicago, campaign workers recall, he took out his copy of the Harvard Law School alumni directory and began dialing to solicit donations. In this campaign cycle, Mr. Obama has raised more than $500,000 from Harvard faculty and staff -- not including alumni -- making the school the third-largest contributor among employers.
  • Some blacks believe that a larger ripple effect is under way -- that Mr. Obama's ascendancy is affecting, for instance, things like the number of black commentators appearing on cable-TV news shows. Says Ms. Butts: "You will see changes in Washington, D.C., where people are making decisions about who is running a news bureau, who is heading up a lobbying shop," bringing in more blacks to top positions.
Levy Rivers

Rob McKay: Small Is the New Big in Progressive Politics - Politics on The Huffington Post - 0 views

  • The grab for this group of voters has generally been coordinated by a seasoned team of professional campaign staff operating in war rooms and spending millions in mobilizing voters. But new efforts among progressive voters, musicians, and grassroots groups are saying the way to be "big" in '08 is to "go small." And how resources are spent in this election and after, could determine whether the Democratic Party is about short-term voter excitement or permanent citizen engagement.
  • This new group of efforts focuses on local leadership, small circles, and cultural organizing. They are taking their strategies from the anti-slavery movement, groups like craigslist, and most surprisingly, a new Christian movement. "
  • Potts and other organizers note that while overall church attendance has steadily declined since the 1990s, a new form of church has taken off--the house church. Unlike traditional churches, the house church movement doesn't meet in a specific house of worship, but instead, as the name suggests, in people's homes.
  • ...2 more annotations...
  • They note the key to the success of these churches is threefold: 1. Shared values rather than on autocratic rule. 2. Peer circles, rather than as a large, rigid, top-down hierarchy. 3. Leading through inspiration rather than by formal authority, allowing, but not forcing, others to follow them.
  • As Potts, who is organizing with musicians during 08, puts it "The conservatives have churches every Sunday, progressives have concerts every night." From an organizing perspective, concerts are for progressives what churches have been for conservatives.
Skeptical Debunker

Leaked intelligence documents: Here's what Facebook and Comcast will tell the police ab... - 0 views

  • The "Facebook Subpoena/Search Warrant Guidelines" from the Cryptome site are dated 2008, so there's a chance they've been superseded. The document spells out how law enforcement and intelligence agenices should go about requesting information about Facebook users, and details what information is turned over. Following is what Facebook will turn over about you, taken verbatim from the guide: Types of Information Available User Neoprint The Neoprint is an expanded view of a given user profile. A request should specify that they are requesting a “Neoprint of used Id XXXXXX”. User Photoprint The Photoprint is a compilation of all photos uploaded by the user that have not been deleted, along with all photos uploaded by any user which have the requested user tagged in them. A request should specify that they are requesting a “Photoprint of user Id XXXXXX”. User Contact Info All user contact information input by the user and not subsequently deleted by the user is available, regardless of whether it is visible in their profile. This information may include the following: Name Birth date Contact e-mail address(s) Physical address City State Zip Phone Cell Work phone Screen name (usually for AOL Messenger/iChat) Website With the exception of contact e-mail and activated mobile numbers, Facebook validates none of this information. A request should specify that they are requesting "Contact information of user specified by [some other piece of contact information]". No historical data is retained. Group Contact Info Where a group is known, we will provide a list of users currently registered in a group. We will also provide a PDF of the current status of the group profile page. A request should specify that they are requesting "Contact information for group XXXXXX". No historical data is retained. IP Logs IP logs can be produced for a given user ID or IP address. A request should specify that they are requesting the "IP log of user Id XXXXXX" or "IP log of IP address xxx.xxx.xxx.xxx". The log contains the following information: * Script – script executed. For instance, a profile view of the URL http://www.facebook.com/profile.php?id=29445421 would populate script with "profile.php" * Scriptget – additional information passed to the script. In the above example, scriptget would contain "id=29445421" * Userid – The Facebook user id of the account active for the request * View time – date of execution in Pacific Time * IP – source IP address IP log data is generally retained for 90 days from present date. However, this data source is under active and major redevelopment and data may be retained for a longer or shorter period. Special Requests The Facebook Security Team may be able to retrieve specific information not addressed in the general categories above. Please contact Facebook if you have a specific investigative need prior to issuing a subpoena or warrant.
  • Comcast The Comcast document is labeled "Comcast Cable Law Enforcement Handbook," and is dated 2007, so there's a possibility that it, too, has been superseded. As with the other documents, it explains how law enforcement agenices can get information, and details what information is available. There's a great deal of detail in the 35-page document, which describes what Internet, phone, and television information will be turned over. For example, here's the IP information it will make available: Comcast currently maintains Internet Protocol address log files for a period of 180 days. If Comcast is asked to respond for information relating to an incident that occurred beyond this period, we will not have responsive information and can not fulfill a legal request. (Comcast can process and respond to preservation requests as outlined below in this Handbook.) As expected, Comcast will also turn over the emails, including attachments, of those who use Comcast's email service, but "In cases involving another entity’s email service or account, Comcast would not have any access to or ability to access customer email in response to a legal request." Information Comcast turns over to law enforcement agencies varies according to the request. For example, a grand jury subpoena will yield more information than a judicial summons, as you can see in the excerpt below. Comcast notes, though, that this is just a sample, and that "Each request is evaluated and reviewed on a case by case basis in light of any special procedural or legal requirements and applicable laws." So the examples "are for illustration only."
  • For those who worry about privacy, though, all of this information is small potatoes. The real worry is about the use of what are called pen registers or trap-and-trace devices, which essentially capture all of your Internet activity --- the Web sites you visits, the emails you send and receive, IM traffic, downloads, and so on. Here's what the document says about them: Pen Register / Trap and Trace Device Title 18 U.S.C. § 3123 provides a mechanism for authorizing and approving the installation and use of a pen register or a trap and trace device pursuant to court order. All orders must be coordinated prior to submission to Comcast. Law enforcement will be asked to agree to reimburse Comcast's reasonable costs incurred to purchase and/or install and monitor necessary equipment. See "Reimbursement," below.
  • ...2 more annotations...
  • As for your voice calls made via Comcast, here's what the company will turn over: Call Detail Records - Comcast maintains two years of historical call detail records (records of local and long distance connections) for our Comcast Digital Voice telephone service. This includes local, local toll, and long distance records. Comcast also currently provides traditional circuit-switched telephone service branded Comcast Digital Phone. Call detail records for this service are collected by AT&T and are available for approximately two years as well. To determine which type of service is involved, contact the Legal Demands Center—Voice and Video at 800-871-6298. Account Records - Account records are generally stored for approximately two years after the termination of an account. If the account has an outstanding balance due, records may be retained for a longer period of time. As with Internet information, what phone information will be turned over depends on the specific kind of legal request, and the examples "are for information only." Here's an excerpt:
  • And, as you would expect, there is the same pen register/trap-and-trace device language as in the section about the Internet. Oddly enough, it appears that when it comes to information about your television viewing habits, you have more privacy rights than you do when it comes to information about your Internet and voice use, because it can only be turned over in response to a court order, not a subpoena. Here's what the document has to say about TV information: Subscriber Account Identification and Related Records For subscribers to our cable television service, the Cable Act requires Comcast as a cable operator to disclose personally identifiable information to a governmental entity solely in response to a court order (and not, for example, a subpoena) or with the subscriber's express written consent. The Cable Act requires that the cable subscriber be afforded the opportunity to appear and contest in a court proceeding relevant to the court order any claims made in support of the court order. At the proceeding, the Cable Act requires the governmental entity to offer clear and convincing evidence that the subject of the information is reasonably suspected of engaging in criminal activity and that the information sought would be material evidence in the case. See 47 U.S.C. § 551(h). Why does the law give you more privacy protection over your television viewing habits than your Internet or phone use? I haven't a clue --- ask your congressman.
  •  
    Wonder what information Facebook and Comcast will turn over to police and intelligence agencies about you? Cryptome, the site that last week posted the leaked Microsoft "spy" manual, has posted company documents that purport to describe what those companies will reveal about you. As with the Microsoft document, the information is eye-opening.
Skeptical Debunker

Unintended Consequences: Twelve Years under the DMCA | Electronic Frontier Foundation - 0 views

  • The DMCA Chills Free Expression and Scientific Research. Experience with section 1201 demonstrates that it is being used to stifle free speech and scientific research. The lawsuit against 2600 magazine, threats against Princeton Professor Edward Felten's team of researchers, and prosecution of Russian programmer Dmitry Sklyarov have chilled the legitimate activities of journalists, publishers, scientists, students, programmers, and members of the public. The DMCA Jeopardizes Fair Use. By banning all acts of circumvention, and all technologies and tools that can be used for circumvention, the DMCA grants to copyright owners the power to unilaterally eliminate the public's fair use rights. Already, the movie industry's use of encryption on DVDs has curtailed consumers' ability to make legitimate, personal-use copies of movies they have purchased. The DMCA Impedes Competition and Innovation. Rather than focusing on pirates, some have wielded the DMCA to hinder legitimate competitors. For example, the DMCA has been used to block aftermarket competition in laser printer toner cartridges, garage door openers, and computer maintenance services. Similarly, Apple has used the DMCA to tie its iPhone and iPod devices to Apple's own software and services. The DMCA Interferes with Computer Intrusion Laws. Further, the DMCA has been misused as a general-purpose prohibition on computer network access, a task for which it was not designed and to which it is ill-suited. For example, a disgruntled employer used the DMCA against a former contractor for simply connecting to the company's computer system through a virtual private network ("VPN").
  •  
    Since they were enacted in 1998, the "anti-circumvention" provisions of the Digital Millennium Copyright Act ("DMCA"), codified in section 1201 of the Copyright Act, have not been used as Congress envisioned. Congress meant to stop copyright infringers from defeating anti-piracy protections added to copyrighted works and to ban the "black box" devices intended for that purpose.1 In practice, the anti-circumvention provisions have been used to stifle a wide array of legitimate activities, rather than to stop copyright infringement. As a result, the DMCA has developed into a serious threat to several important public policy priorities:
Michael Haltman

Security issues at the 2010 FIFA World Cup in South Africa (Video) - 0 views

  •  
    Great video of the security issues South Africa will face at the 2010 World Cup.
Kelly Bounce

Ignite AV: Europe's Best AV Provider from the UK - 2 views

I give a lot of lectures all over Europe and the UK and I really need the best AV team to assist me in all my talks. I discovered Ignite AV, and having this AV Hire company has changed my whole exp...

projector hire

started by Kelly Bounce on 25 Jul 11 no follow-up yet
« First ‹ Previous 41 - 49 of 49
Showing 20 items per page