The fact that the party even has superdelegates is a sign of its anti-democratic, pro-oligarchy stance. As Branko Marcetic of In These Times reports the superdelegate system was created specifically to challenge the will of voters. According to Marcetic, “When a Sanders supporter criticized superdelegate Howard Dean for sticking with Clinton despite Sanders’ landslide victory in Vermont, Dean tweeted back: “Superdelegates don’t represent the people.”
how hard to lean on approval? ask a landmine survivor and NGO's - topic:Miss Landmine C... - 0 views
-
When she was only five years old, Song Kosal, was a little girl growing up in Cambodia. 300 grams of TNT exploded. A GYATA 64 anti-personnel mine produced by Hungary changed her life. She survived and in her mid twenties, her poster-size picture was carried down a run-way by girls and women from a Cambodian community in Norway at the South Norway Museum of Modern Arts at the Miss Landmine Cambodia finale-in-exile on November 14th. Song Kosal heard the news that her government had banned the Miss Landmine Contest only days before the event was supposed to take place.
10 reasons why #DemExit is serious: Getting rid of Debbie Wasserman Schultz is not enou... - 0 views
-
-
The DNC created a debate schedule designed to make it hard for candidates to challenge Clinton’s status as the “presumptive” nominee. Debates were held on weekends, at times that conflicted with other events, and were generally slotted to attract fewer viewers.
-
Fox News offered to host one. Fox News wrote that, “the race is still contested, and given that you sanctioned a final trio of debates, the last of which has not yet been held, we believe a final debate would be an excellent opportunity for the candidates to, as you said when you announced these debates, ‘share Democrats’ vision for the country.’” There never was a California debate set up. Not on Fox News or any other venue.
- ...3 more annotations...
Business Reputation: Creativity and Happiness: Reputation: Building on Trust - 0 views
-
One of the major outcomes of the attacks of 9/11 is the clear contest between forces that believe that the world civilization so based on trust can endure the counter views of the terrorist. The question for me is to what degree do our USA national reputation and organizing principles engender trust and freedom.
-
Barack (Lets reason together) is clearly for recapturing our lost status and McCain wants to extend the tough guy image of the Bush doctrine (Fear US - USA reserves the right to attack first).
-
This is especially understood - but not excused - in those of my generation and older, both from a black and white perspective. For blacks its owed to us based on time in the country - as if a quota could make such a tactic make sense or even worse is he black enough to get back what racism over these many years has taken from us. On the other end are whites that figure that any black person smart enough to become President must be smart enough to take back from them all the advantages that they have accumulated.
Leaked intelligence documents: Here's what Facebook and Comcast will tell the police ab... - 0 views
-
The "Facebook Subpoena/Search Warrant Guidelines" from the Cryptome site are dated 2008, so there's a chance they've been superseded. The document spells out how law enforcement and intelligence agenices should go about requesting information about Facebook users, and details what information is turned over. Following is what Facebook will turn over about you, taken verbatim from the guide: Types of Information Available User Neoprint The Neoprint is an expanded view of a given user profile. A request should specify that they are requesting a “Neoprint of used Id XXXXXX”. User Photoprint The Photoprint is a compilation of all photos uploaded by the user that have not been deleted, along with all photos uploaded by any user which have the requested user tagged in them. A request should specify that they are requesting a “Photoprint of user Id XXXXXX”. User Contact Info All user contact information input by the user and not subsequently deleted by the user is available, regardless of whether it is visible in their profile. This information may include the following: Name Birth date Contact e-mail address(s) Physical address City State Zip Phone Cell Work phone Screen name (usually for AOL Messenger/iChat) Website With the exception of contact e-mail and activated mobile numbers, Facebook validates none of this information. A request should specify that they are requesting "Contact information of user specified by [some other piece of contact information]". No historical data is retained. Group Contact Info Where a group is known, we will provide a list of users currently registered in a group. We will also provide a PDF of the current status of the group profile page. A request should specify that they are requesting "Contact information for group XXXXXX". No historical data is retained. IP Logs IP logs can be produced for a given user ID or IP address. A request should specify that they are requesting the "IP log of user Id XXXXXX" or "IP log of IP address xxx.xxx.xxx.xxx". The log contains the following information: * Script – script executed. For instance, a profile view of the URL http://www.facebook.com/profile.php?id=29445421 would populate script with "profile.php" * Scriptget – additional information passed to the script. In the above example, scriptget would contain "id=29445421" * Userid – The Facebook user id of the account active for the request * View time – date of execution in Pacific Time * IP – source IP address IP log data is generally retained for 90 days from present date. However, this data source is under active and major redevelopment and data may be retained for a longer or shorter period. Special Requests The Facebook Security Team may be able to retrieve specific information not addressed in the general categories above. Please contact Facebook if you have a specific investigative need prior to issuing a subpoena or warrant.
-
Comcast The Comcast document is labeled "Comcast Cable Law Enforcement Handbook," and is dated 2007, so there's a possibility that it, too, has been superseded. As with the other documents, it explains how law enforcement agenices can get information, and details what information is available. There's a great deal of detail in the 35-page document, which describes what Internet, phone, and television information will be turned over. For example, here's the IP information it will make available: Comcast currently maintains Internet Protocol address log files for a period of 180 days. If Comcast is asked to respond for information relating to an incident that occurred beyond this period, we will not have responsive information and can not fulfill a legal request. (Comcast can process and respond to preservation requests as outlined below in this Handbook.) As expected, Comcast will also turn over the emails, including attachments, of those who use Comcast's email service, but "In cases involving another entity’s email service or account, Comcast would not have any access to or ability to access customer email in response to a legal request." Information Comcast turns over to law enforcement agencies varies according to the request. For example, a grand jury subpoena will yield more information than a judicial summons, as you can see in the excerpt below. Comcast notes, though, that this is just a sample, and that "Each request is evaluated and reviewed on a case by case basis in light of any special procedural or legal requirements and applicable laws." So the examples "are for illustration only."
-
For those who worry about privacy, though, all of this information is small potatoes. The real worry is about the use of what are called pen registers or trap-and-trace devices, which essentially capture all of your Internet activity --- the Web sites you visits, the emails you send and receive, IM traffic, downloads, and so on. Here's what the document says about them: Pen Register / Trap and Trace Device Title 18 U.S.C. § 3123 provides a mechanism for authorizing and approving the installation and use of a pen register or a trap and trace device pursuant to court order. All orders must be coordinated prior to submission to Comcast. Law enforcement will be asked to agree to reimburse Comcast's reasonable costs incurred to purchase and/or install and monitor necessary equipment. See "Reimbursement," below.
- ...2 more annotations...
-
Wonder what information Facebook and Comcast will turn over to police and intelligence agencies about you? Cryptome, the site that last week posted the leaked Microsoft "spy" manual, has posted company documents that purport to describe what those companies will reveal about you. As with the Microsoft document, the information is eye-opening.
Analysis: Republicans setting filibuster record - Yahoo! News - 0 views
-
-
Opposition Republicans are using the delaying tactic at a record-setting pace. "The numbers are astonishing in this Congress," says Jim Riddlesperger, political science professor at Texas Christian University in Fort Worth. The filibuster, using seemingly endless debate to block legislative action, has become entrenched like a dandelion tap root in the midst of the shrill partisanship gripping Washington. But the filibuster is nothing new. Its use dates to the mists of Senate history, but until the civil rights era, it was rarely used.
-
As a matter of political philosophy, the concept of the filibuster arises from a deep-seated, historic concern among Americans that the minority not be steamrolled by the majority. It is a brake and protective device rooted in the same U.S. political sensibility that gave each state two senators regardless of population. The same impulse gave Americans the Electoral College in presidential contests — a structure from earliest U.S. history designed to give smaller population states greater influence in choosing the nation's leader. Given recent use of the filibuster by minority Republicans and the party's success in snarling the legislative process in this Congress, Democrats say the minority has gone way beyond just protecting its interests. The frequency of filibusters — plus threats to use them — are measured by the number of times the upper chamber votes on cloture. Such votes test the majority's ability to hold together 60 members to break a filibuster. In the 110th Congress of 2007-2008, with Republicans in the minority, there were a record 112 cloture votes. In the current session of Congress — the 111th — for all of 2009 and the first two months of 2010 the number already exceeds 40. The most the filibuster has been used when Democrats were in the minority was 58 times in the 106th Congress of 1999-2000.
-
Having railed against the Democratic minorities' use of ANY filibuster in the last several Congressional sessions when Republicans were in the majority, the Republicans now hypocritically are taking the use of the filibuster to new heights. Forgotten are their own strident and indignant demands that the "people" deserved the Senate allowing an "up or down vote". And that they would (and did) use a "nuclear option" or reconciliation if necessary to make that happen. The filibuster - tool of obstruction in the U.S. Senate - is alternately blamed and praised for wilting President Barack Obama's ambitious agenda. Some even say it's made the nation ungovernable.
1 - 7 of 7
Showing 20▼ items per page