Skip to main content

Home/ Politically Minded/ Group items tagged access

Rss Feed Group items tagged

Eric G. Young

Senators Pryor, Kerry Propose Equal Internet Access For Disabled - 0 views

  •  
    On May 5, 2010, Senators Mark Pryor (AR) and John Kerry (MA) introduced the "Equal Access to 21st Century Communications Act" (S. 3304). Senators Byron Dorgan and Kent Conrad, both from North Dakota, also co-sponsored the bill.
Ian Schlom

US top court annuls key part of voting law - 0 views

  •  
    A part of the voting rights act was annulled by the Supreme Court because it's believed that the legislation is out-of-date and that it's not unclear what areas actually need federal monitoring. So it's removing the protection of the federal government from monitored voting in the South. They talk about racial progress and change that'd happened in the 40 years since the voting rights act happened. Obama's not too happy with it, says that voting discrimination still exists in the country, and is calling on Congress to create legislation that would create equal access to voting.
Fay Paxton

The False Virtue of Catholic Bishops and the Courts |The Political Pragmatic - 0 views

  •  
    Under the guise of religious consciousness and First Amendment rights, Conservatives are mounting yet another assault on women's health and freedom that would deny millions of women access to affordable contraception. While the challenge scheduled to be heard by the Supreme Court was not brought by Catholics, it's all the same to me. Besides, they were the loudest and most aggressive in their objections. So, I decided to repost this information I presented during the 2010 debate because the objections represents the epitome of hypocrisy and false morality to me.
thinkahol *

Free Press | Media reform through education, organizing and advocacy - 0 views

  •  
    Free Press is a national, nonpartisan, nonprofit organization working to reform the media. Through education, organizing and advocacy, we promote diverse and independent media ownership, strong public media, quality journalism, and universal access to communications.
thinkahol *

America the Exceptional - Glenn Greenwald - Salon.com - 0 views

  •  
    The U.S. forces Iraq to pay $400 million to torture victims 2 days after America's victims are denied court access
thinkahol *

:: Download Free Political Documentaries And Watch Many Interesting, Controversial Free... - 0 views

  •  
    At freedocumentaries.org we strongly believe that in order to have a true democracy, there has to be a free flow of easily accessible information. Unfortunately, many important perspectives, opinions, and facts never make it to our televisions or cinemas (you can watch movies in our media category if you want to know why).
Skeptical Debunker

Leaked intelligence documents: Here's what Facebook and Comcast will tell the police ab... - 0 views

  • The "Facebook Subpoena/Search Warrant Guidelines" from the Cryptome site are dated 2008, so there's a chance they've been superseded. The document spells out how law enforcement and intelligence agenices should go about requesting information about Facebook users, and details what information is turned over. Following is what Facebook will turn over about you, taken verbatim from the guide: Types of Information Available User Neoprint The Neoprint is an expanded view of a given user profile. A request should specify that they are requesting a “Neoprint of used Id XXXXXX”. User Photoprint The Photoprint is a compilation of all photos uploaded by the user that have not been deleted, along with all photos uploaded by any user which have the requested user tagged in them. A request should specify that they are requesting a “Photoprint of user Id XXXXXX”. User Contact Info All user contact information input by the user and not subsequently deleted by the user is available, regardless of whether it is visible in their profile. This information may include the following: Name Birth date Contact e-mail address(s) Physical address City State Zip Phone Cell Work phone Screen name (usually for AOL Messenger/iChat) Website With the exception of contact e-mail and activated mobile numbers, Facebook validates none of this information. A request should specify that they are requesting "Contact information of user specified by [some other piece of contact information]". No historical data is retained. Group Contact Info Where a group is known, we will provide a list of users currently registered in a group. We will also provide a PDF of the current status of the group profile page. A request should specify that they are requesting "Contact information for group XXXXXX". No historical data is retained. IP Logs IP logs can be produced for a given user ID or IP address. A request should specify that they are requesting the "IP log of user Id XXXXXX" or "IP log of IP address xxx.xxx.xxx.xxx". The log contains the following information: * Script – script executed. For instance, a profile view of the URL http://www.facebook.com/profile.php?id=29445421 would populate script with "profile.php" * Scriptget – additional information passed to the script. In the above example, scriptget would contain "id=29445421" * Userid – The Facebook user id of the account active for the request * View time – date of execution in Pacific Time * IP – source IP address IP log data is generally retained for 90 days from present date. However, this data source is under active and major redevelopment and data may be retained for a longer or shorter period. Special Requests The Facebook Security Team may be able to retrieve specific information not addressed in the general categories above. Please contact Facebook if you have a specific investigative need prior to issuing a subpoena or warrant.
  • Comcast The Comcast document is labeled "Comcast Cable Law Enforcement Handbook," and is dated 2007, so there's a possibility that it, too, has been superseded. As with the other documents, it explains how law enforcement agenices can get information, and details what information is available. There's a great deal of detail in the 35-page document, which describes what Internet, phone, and television information will be turned over. For example, here's the IP information it will make available: Comcast currently maintains Internet Protocol address log files for a period of 180 days. If Comcast is asked to respond for information relating to an incident that occurred beyond this period, we will not have responsive information and can not fulfill a legal request. (Comcast can process and respond to preservation requests as outlined below in this Handbook.) As expected, Comcast will also turn over the emails, including attachments, of those who use Comcast's email service, but "In cases involving another entity’s email service or account, Comcast would not have any access to or ability to access customer email in response to a legal request." Information Comcast turns over to law enforcement agencies varies according to the request. For example, a grand jury subpoena will yield more information than a judicial summons, as you can see in the excerpt below. Comcast notes, though, that this is just a sample, and that "Each request is evaluated and reviewed on a case by case basis in light of any special procedural or legal requirements and applicable laws." So the examples "are for illustration only."
  • For those who worry about privacy, though, all of this information is small potatoes. The real worry is about the use of what are called pen registers or trap-and-trace devices, which essentially capture all of your Internet activity --- the Web sites you visits, the emails you send and receive, IM traffic, downloads, and so on. Here's what the document says about them: Pen Register / Trap and Trace Device Title 18 U.S.C. § 3123 provides a mechanism for authorizing and approving the installation and use of a pen register or a trap and trace device pursuant to court order. All orders must be coordinated prior to submission to Comcast. Law enforcement will be asked to agree to reimburse Comcast's reasonable costs incurred to purchase and/or install and monitor necessary equipment. See "Reimbursement," below.
  • ...2 more annotations...
  • As for your voice calls made via Comcast, here's what the company will turn over: Call Detail Records - Comcast maintains two years of historical call detail records (records of local and long distance connections) for our Comcast Digital Voice telephone service. This includes local, local toll, and long distance records. Comcast also currently provides traditional circuit-switched telephone service branded Comcast Digital Phone. Call detail records for this service are collected by AT&T and are available for approximately two years as well. To determine which type of service is involved, contact the Legal Demands Center—Voice and Video at 800-871-6298. Account Records - Account records are generally stored for approximately two years after the termination of an account. If the account has an outstanding balance due, records may be retained for a longer period of time. As with Internet information, what phone information will be turned over depends on the specific kind of legal request, and the examples "are for information only." Here's an excerpt:
  • And, as you would expect, there is the same pen register/trap-and-trace device language as in the section about the Internet. Oddly enough, it appears that when it comes to information about your television viewing habits, you have more privacy rights than you do when it comes to information about your Internet and voice use, because it can only be turned over in response to a court order, not a subpoena. Here's what the document has to say about TV information: Subscriber Account Identification and Related Records For subscribers to our cable television service, the Cable Act requires Comcast as a cable operator to disclose personally identifiable information to a governmental entity solely in response to a court order (and not, for example, a subpoena) or with the subscriber's express written consent. The Cable Act requires that the cable subscriber be afforded the opportunity to appear and contest in a court proceeding relevant to the court order any claims made in support of the court order. At the proceeding, the Cable Act requires the governmental entity to offer clear and convincing evidence that the subject of the information is reasonably suspected of engaging in criminal activity and that the information sought would be material evidence in the case. See 47 U.S.C. § 551(h). Why does the law give you more privacy protection over your television viewing habits than your Internet or phone use? I haven't a clue --- ask your congressman.
  •  
    Wonder what information Facebook and Comcast will turn over to police and intelligence agencies about you? Cryptome, the site that last week posted the leaked Microsoft "spy" manual, has posted company documents that purport to describe what those companies will reveal about you. As with the Microsoft document, the information is eye-opening.
Skeptical Debunker

The Comprehensive National Cybersecurity Initiative | The White House - 0 views

  • The CNCI consists of a number of mutually reinforcing initiatives with the following major goals designed to help secure the United States in cyberspace: To establish a front line of defense against today’s immediate threats by creating or enhancing shared situational awareness of network vulnerabilities, threats, and events within the Federal Government—and ultimately with state, local, and tribal governments and private sector partners—and the ability to act quickly to reduce our current vulnerabilities and prevent intrusions. To defend against the full spectrum of threats by enhancing U.S. counterintelligence capabilities and increasing the security of the supply chain for key information technologies. To strengthen the future cybersecurity environment by expanding cyber education; coordinating and redirecting research and development efforts across the Federal Government; and working to define and develop strategies to deter hostile or malicious activity in cyberspace.
  •  
    President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we as a government or as a country are not adequately prepared to counter. Shortly after taking office, the President therefore ordered a thorough review of federal efforts to defend the U.S. information and communications infrastructure and the development of a comprehensive approach to securing America's digital infrastructure. In May 2009, the President accepted the recommendations of the resulting Cyberspace Policy Review, including the selection of an Executive Branch Cybersecurity Coordinator who will have regular access to the President. The Executive Branch was also directed to work closely with all key players in U.S. cybersecurity, including state and local governments and the private sector, to ensure an organized and unified response to future cyber incidents; strengthen public/private partnerships to find technology solutions that ensure U.S. security and prosperity; invest in the cutting-edge research and development necessary for the innovation and discovery to meet the digital challenges of our time; and begin a campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms and begin to build the digital workforce of the 21st century. Finally, the President directed that these activities be conducted in a way that is consistent with ensuring the privacy rights and civil liberties guaranteed in the Constitution and cherished by all Americans.
thinkahol *

U.S. Justice v. the world - Glenn Greenwald - Salon.com - 0 views

  •  
    In March, 2002, American citizen Jose Padilla was arrested in Chicago and publicly accused by then-Attorney-General John Ashcroft of being "The Dirty Bomber."  Shortly thereafter, he was transferred to a military brig in South Carolina, where he was held for almost two years completely incommunicado (charged with no crime and denied all access to the outside world, including even a lawyer) and was brutally tortured, both physically and psychologically.  All of this -- including the torture -- was carried out pursuant to orders from President Bush, Secretary Rumsfeld and other high-ranking officials.  Just as the Supreme Court was about to hear Padilla's plea to be charged or released -- and thus finally decide if the President has the power to imprison American citizens on U.S. soil with no charges of any kind -- the Government indicted him in a federal court on charges far less serious than Ashcroft had touted years earlier, causing the Supreme Court to dismiss Padilla's arguments as "moot"; Padilla was then convicted and sentenced to 17 years in prison.
thinkahol *

Chris Hedges: Why Liberal Sellouts Attack Prophets Like Cornel West - Chris Hedges' Col... - 0 views

  •  
    The liberal class, which attempted last week to discredit the words my friend Cornel West spoke about Barack Obama and the Democratic Party, prefers comfort and privilege to justice, truth and confrontation. Its guiding ideological stance is determined by what is most expedient to the careers of its members. It refuses to challenge, in a meaningful way, the decaying structures of democracy or the ascendancy of the corporate state. It glosses over the relentless assault on working men and women and the imperial wars that are bankrupting the nation. It proclaims its adherence to traditional liberal values while defending and promoting systems of power that mock these values.The pillars of the liberal establishment-the press, the church, culture, the university, labor and the Democratic Party-all honor an unwritten quid pro quo with corporations and the power elite, as well as our masters of war, on whom they depend for money, access and positions of influence. Those who expose this moral cowardice and collaboration with corporate power are always ruthlessly thrust aside.
thinkahol *

I am not a "global warming denialist" - War Room - Salon.com - 0 views

  •  
    In his thoughtful criticism of my essay on the future of fossil fuels and the poor prospects for renewable energy, Andrew Leonard characterizes my message as one that "we have nothing to worry about." This may be partly the fault of my presentation, because in the course of being provocative I did not make it sufficiently clear that I was engaged in analysis, not advocacy. I made the prediction that, even in the presence of global warming, the countries of the world are unlikely to allow the vast stores of fossil fuels in the earth's crust to lie there undisturbed, when technology is making many of them ever more accessible and cheaper than the renewable energy alternatives. For the record, I personally wish that greenhouse gas emissions would stop immediately, and I personally would prefer a world of harmonious international cooperation for all time. Neither of my personal preferences is going to be fulfilled and neither affects the accuracy of my analysis.
thinkahol *

U.S. Chamber To Rank Politicians On Whether They Vote To Keep Contractor Donations Secr... - 0 views

  •  
    The U.S. Chamber of Commerce has written a letter to members of the House telling them that voting for federal contractors to be more transparent about their political spending will negatively impact their legislative scorecard. "The U.S. Chamber of Commerce strongly supports legislative proposals to ensure that political spending -- or the lack thereof -- continues to play no role in federal contracting decisions," the Chamber's R. Bruce Josten wrote in the letter sent on Wednesday. "Therefore, the Chamber supports amendments that have been offered by Rep. Cole to several Fiscal Year 2012 appropriations bills considered by the full House, and any similar amendments should they be offered to the remaining FY 2012 appropriations bills," he wrote. Meanwhile, more than sixty members of the House signed a letter sent to the White House by Rep. Anna G. Eshoo (D-CA) which expressed strong support for a draft executive order which would require companies that get taxpayer dollars to disclose their political expenditures. Disclosure, the letter says, "will not politicize the procurement process -- it will improve it." "Political expenditures are already well-known to those that make them and to the officials who benefit," the letter states. "With disclosure, the public will have access to this information as well, allowing them to judge whether contracts were awarded based on merit. A meritorious procurement system is the only responsible use of taxpayer money, making this a deficit reduction effort as much as a campaign finance reform issue." Both the Chamber and House Republicans have argued that the proposed executive order -- first leaked in April -- is a plot by the Obama administration to silence political opponents. Supporters of the measure have said the executive order -- by bringing donations out into the open -- would actually discourage federal contracting officials from doing favors for contractors based on their donations to third-party political groups
thinkahol *

Cell Phone Censorship in San Francisco? » Blog of Rights: Official Blog of th... - 0 views

  •  
    Pop quiz: where did a government agency shut down cell service yesterday to disrupt a political protest? Syria? London? Nope. San Francisco. The answer may seem surprising, but that's exactly what happened yesterday evening. The Bay Area Rapid Transit (BART) asked wireless providers to halt service in four stations in San Francisco to prevent protestors from communicating with each other. The action came after BART notified riders that there might be demonstrations in the city. All over the world people are using mobile devices to organize protests against repressive regimes, and we rightly criticize governments that respond by shutting down cell service, calling their actions anti-democratic and a violation of the rights to free expression and assembly. Are we really willing to tolerate the same silencing of protest here in the United States? BART's actions were glaringly small-minded as technology and the ability to be connected have many uses. Imagine if someone had a heart attack on the train when the phones were blocked and no one could call 911. And where do we draw the line? These protestors were using public transportation to get to the demonstration - should the government be able to shut that down too? Shutting down access to mobile phones is the wrong response to political protests, whether it's halfway around the world or right here at home. The First Amendment protects everybody's right to free expression, and when the government responds to people protesting against it by silencing them, it's dangerous to democracy.
thinkahol *

WHERE GOOD IDEAS COME FROM by Steven Johnson - YouTube - 0 views

  •  
    One of our most innovative, popular thinkers takes on-in exhilarating style-one of our key questions: Where do good ideas come from? With Where Good Ideas Come From, Steven Johnson pairs the insight of his bestselling Everything Bad Is Good for You and the dazzling erudition of The Ghost Map and The Invention of Air to address an urgent and universal question: What sparks the flash of brilliance? How does groundbreaking innovation happen? Answering in his infectious, culturally omnivorous style, using his fluency in fields from neurobiology to popular culture, Johnson provides the complete, exciting, and encouraging story of how we generate the ideas that push our careers, our lives, our society, and our culture forward. Beginning with Charles Darwin's first encounter with the teeming ecosystem of the coral reef and drawing connections to the intellectual hyperproductivity of modern megacities and to the instant success of YouTube, Johnson shows us that the question we need to ask is, What kind of environment fosters the development of good ideas? His answers are never less than revelatory, convincing, and inspiring as Johnson identifies the seven key principles to the genesis of such ideas, and traces them across time and disciplines. Most exhilarating is Johnson's conclusion that with today's tools and environment, radical innovation is extraordinarily accessible to those who know how to cultivate it. Where Good Ideas Come From is essential reading for anyone who wants to know how to come up with tomorrow's great ideas.
cysko cysko

New services promise online life after death - CNN.com - 0 views

  •  
    A Legacy Locker account costs $29.99 a year. Users can set up their accounts at www.legacylocker.com to specify who gets access to their posthumous online information, along with "legacy letters," or messages, that can be sent to loved ones.
thinkahol *

Libya: All About Oil, or All About Banking? - 0 views

  •  
    'So is this new war all about oil or all about banking? Maybe both - and water as well. With energy, water, and ample credit to develop the infrastructure to access them, a nation can be free of the grip of foreign creditors. And that may be the real threat of Libya: it could show the world what is 
thinkahol *

For Activists, Tips in Safer Use of Social Media - Noticed - NYTimes.com - 0 views

  •  
    several groups of free information advocates have emerged to help educate the latest generation of activists. To that end, one such group, Access, just released its guide to maintaining online and mobile phone security, with versions in Arabic and English.
thinkahol *

HOLY BAILOUT - Federal Reserve Now Backstopping $75 Trillion Of Bank Of Ameri... - 0 views

  •  
    This story from Bloomberg just hit the wires this morning.  Bank of America is shifting derivatives in its Merrill investment banking unit to its depository arm, which has access to the Fed discount window and is protected by the FDIC. What this means for you is that when Europe finally implodes and banks fail, U.S. taxpayers will hold the bag for trillions in CDS insurance contracts sold by Bank of America and JP Morgan.  Even worse, the total exposure is unknown because Wall Street successfully lobbied during Dodd-Frank passage so that no central exchange would exist keeping track of net derivative exposure.
Fay Paxton

The Politics of Reproductive Healthcare |The Political Pragmatic - 0 views

  •  
    Since the 2010 elections, according to the Guttmacher Institute, Republican legislators have introduced more than 2,000 bills related to women's reproductive healthcare. The assault on women's health and freedom denies millions of women access to affordable contraception, life-saving cancer screenings, testing for H.I.V. and other sexually transmitted diseases. Some laws call for measures as drastic as imprisonment. In 2013, National Advocates for Pregnant Women, published the results of a study that examined cases in which a woman's pregnancy led to arrests and incarceration, detentions in hospitals, mental institutions, and forced medical interventions. The summary of some cases follows:
Outsider Trading

Technology for the Masses - 0 views

  •  
    When it comes to technology, Universities have always been on the cutting edge. Today, many Universities sport subatomic microscopes, mass spectrometers, and particle separators to name a few. However, with all of this technology universities have failed to use technology to advance access to education.
1 - 20 of 31 Next ›
Showing 20 items per page