Skip to main content

Home/ Politically Minded/ Group items tagged h

Rss Feed Group items tagged

thinkahol *

Keeping a Curious Bush Secret | Consortiumnews - 0 views

  •  
    Exclusive: One of the strange mysteries from the Reagan-Bush era is where did George H.W. Bush go on one Sunday in October 1980 when some witnesses placed him meeting with Iranians in Paris. More than three decades later, Bush's supposed alibi remains a state secret, Robert Parry reports.
Brett Tatman

The Culmination of Liberal Incrementalism - 0 views

  •  
    The opening words of H.R. 3200, Mr. Obama s solution to the manufactured health care quot;crisis quot; in the United States reads: quot;A Bill to provide affordable, quality health care for all Americans and reduce the growth in health care spending, and for other purposes. quot; I haven t yet heard comment by the president or by the leaders of C
thinkahol *

William Blum: Libya and the Holy Triumvirate - 0 views

  •  
    ‎"Six countries that Barack H. Obama has waged waragainst in his 26 months in office. (To anyone who disputes that dropping bombs on a populated land is an act of war, I would ask what they think of the Japanese bombing of Pearl Harbor.) America'sfirst black president now invades Africa. Is there anyone left who still thinks that Barack Obama is some kind of improvement over George W. Bush?"
thinkahol *

Prison inmates replace unionized workers in Racine, Wisconsin | The Raw Story - 0 views

  •  
    Prison inmates have replaced union workers in Racine County, Wisconsin, thanks to the changes to the states collective bargaining laws that went into effect at the end of June. The Journal Times reported prison inmates will now be able to do tasks such as landscaping, painting, and shoveling sidewalks in the winter that were previously performed by unionized employees. Inmates are not required to do any work for the county, but can receive time off their sentence if they do. Racine County Executive Jim Ladwig said the use of prison labor would not result in any public works staff reductions. "We're gonna have them do landscaping at county buildings, have them pick up trash on the roads," he told local Fox News 6. "So we can use some of the county personnel to do difficult tasks, such as putting in a parking lot at the park." Republican Gov. Scott Walker signed a non-fiscal version of his budget plan into law in March that stripped nearly all collective bargaining rights from Wisconsin public workers, giving officials the power to make many changes affecting workers without formal negotiations. (H/T: Alex Seitz-Wald)
thinkahol *

Roger Ailes' Secret Nixon-Era Blueprint for Fox News - 0 views

  •  
    Republican media strategist Roger Ailes launched Fox News Channel in 1996, ostensibly as a "fair and balanced" counterpoint to what he regarded as the liberal establishment media. But according to a remarkable document buried deep within the Richard Nixon Presidential Library, the intellectual forerunner for Fox News was a nakedly partisan 1970 plot by Ailes and other Nixon aides to circumvent the "prejudices of network news" and deliver "pro-administration" stories to heartland television viewers. The memo-called, simply enough, "A Plan For Putting the GOP on TV News"- is included in a 318-page cache of documents detailing Ailes' work for both the Nixon and George H.W.
Fay Paxton

The Politics of Reproductive Healthcare |The Political Pragmatic - 0 views

  •  
    Since the 2010 elections, according to the Guttmacher Institute, Republican legislators have introduced more than 2,000 bills related to women's reproductive healthcare. The assault on women's health and freedom denies millions of women access to affordable contraception, life-saving cancer screenings, testing for H.I.V. and other sexually transmitted diseases. Some laws call for measures as drastic as imprisonment. In 2013, National Advocates for Pregnant Women, published the results of a study that examined cases in which a woman's pregnancy led to arrests and incarceration, detentions in hospitals, mental institutions, and forced medical interventions. The summary of some cases follows:
Muslim Academy

Anti U.S. protests in Pakistan - 0 views

  •  
    Series of protests took place all over the world and didn't spare Pakistan - Muslim country. Muslims around the country came up with huge anger and disappointment against the making of anti-Islam film. In many other parts of the world, protests captured huge attention of the international media as U.S. embassies were burnt and stormed. For instance, Egypt, Syria, Yemen etc. Muslims gathered in a great number and raised their voice against the making of the film. In some parts of the world, U.S. flag had been burnt and replaced with a black flag having words written on it as "There is no God but God, and Mohammad is his messenger" A small budget movie named "innocence of the Muslims" was made by an individual of California and put over the internet. This movie didn't get any attention until the subtitles were poste din Arabic and sent to the Egyptian journalists. Movie made humiliates the sentiments of the Muslims as it tried to shun the image of beloved Prophet (peace and blessings upon him). Movie made touches the themes of paedophilia and homosexuality. In Pakistan, security measured were tightened by the local police and made sure no violence hit and destroy U.S. embassy. Recently, violence hit the security of the U.S. embassies in many Muslim countries. Many U.S. embassies such as in Egypt, Libya, Yemen were stormed by the protestors greatly. The brazen attack on the U.S embassy also killed an American; the angry souls were tickled by "video linked to Florida pastor Terry Jones, whose public burning of the Koran in 2010 led to deadly protests in Afghanistan. The film reportedly mocks the prophet Muhammad." as per the sources.
Joe La Fleur

NewsBusted 7/31/12 - YouTube - 0 views

  •  
    VERY FUNNY
Arabica Robusta

Building a civil economy | openDemocracy - 6 views

  • my argument is that humans are more relational, ‘gift-exchanging animals’ who are naturally disposed to cooperate for mutual benefit. In the following I will attempt to show how such an alternative anthropology can translate into a ‘civil economy’ and transformative policy ideas: rebuilding our economy and embedding welfare in communities.
  • In the wake of Marcel Mauss’ work on the gift, this model emerged as a legitimate way of rethinking economics: humans are naturally social animals with dispositions to cooperate in the quest for the common good in which all can partake.
  • Building on Polanyi and G. D. H. Cole’s guild socialism, one can suggest that an embedded model means that elected governments have the duty to create the civic space in which workers, businesses and communities can regulate economic activity and direct the ‘free flow’ of globally mobile capital to productive activities that benefit the many, not the few.
  • ...3 more annotations...
  • At national and supranational levels, caps on interest rates would help curb the predations of creditors upon debtors. Linked to such limits on financial domination are new incentives and rewards for channelling capital in productive, human and social activities.
  • f the declared aim is to preserve the dignity of natural and human life, then all participants in the public realm have a duty to promote human relationships and associations that nurture the social bonds of trust and reciprocal help upon which both democracy and the economy rely.
  • Thus, the link between different actors and levels is a series of abstract, formal rights and entitlements or monetised, market relations (or again both at once). As such, welfare beneficiaries are reduced to merely passive recipients of a ‘one-size-fits-all’, top-down service. State paternalism and private contract delivery cost more to deliver less, and they lock people either into demoralising dependency on the central state or financially unaffordable dependency on outsourced, private contractors.
thinkahol *

t r u t h o u t | Soldier at WikiLeaks Scene Says No Attack Was Being Planned - 0 views

  •  
    The soldier in a now-famous WikiLeaks video, who found a rocket launcher at the scene of a controversial 2007 Apache helicopter attack, in Baghdad, said in a radio interview this week that he did not believe an ambush was imminent. The video shows 12 men, including two Reuters newsmen, standing on a street corner before being fired upon by the Apache's 30mm cannon, resulting in what appears to be an unprovoked massacre.
thinkahol *

t r u t h o u t | By US Deaths, as of Today, Afghanistan Is Obama's War - 0 views

  •  
    Five hundred seventy-five: That's how many US soldiers have lost their lives in the Afghanistan war since Barack Obama became president at noon on January 20, 2009, according to the icasualties.org web site, which tracks US soldiers' deaths using reports received from the Department of Defense - and which is widely cited in the media as a source of information on US deaths.
Skeptical Debunker

Leaked intelligence documents: Here's what Facebook and Comcast will tell the police ab... - 0 views

  • The "Facebook Subpoena/Search Warrant Guidelines" from the Cryptome site are dated 2008, so there's a chance they've been superseded. The document spells out how law enforcement and intelligence agenices should go about requesting information about Facebook users, and details what information is turned over. Following is what Facebook will turn over about you, taken verbatim from the guide: Types of Information Available User Neoprint The Neoprint is an expanded view of a given user profile. A request should specify that they are requesting a “Neoprint of used Id XXXXXX”. User Photoprint The Photoprint is a compilation of all photos uploaded by the user that have not been deleted, along with all photos uploaded by any user which have the requested user tagged in them. A request should specify that they are requesting a “Photoprint of user Id XXXXXX”. User Contact Info All user contact information input by the user and not subsequently deleted by the user is available, regardless of whether it is visible in their profile. This information may include the following: Name Birth date Contact e-mail address(s) Physical address City State Zip Phone Cell Work phone Screen name (usually for AOL Messenger/iChat) Website With the exception of contact e-mail and activated mobile numbers, Facebook validates none of this information. A request should specify that they are requesting "Contact information of user specified by [some other piece of contact information]". No historical data is retained. Group Contact Info Where a group is known, we will provide a list of users currently registered in a group. We will also provide a PDF of the current status of the group profile page. A request should specify that they are requesting "Contact information for group XXXXXX". No historical data is retained. IP Logs IP logs can be produced for a given user ID or IP address. A request should specify that they are requesting the "IP log of user Id XXXXXX" or "IP log of IP address xxx.xxx.xxx.xxx". The log contains the following information: * Script – script executed. For instance, a profile view of the URL http://www.facebook.com/profile.php?id=29445421 would populate script with "profile.php" * Scriptget – additional information passed to the script. In the above example, scriptget would contain "id=29445421" * Userid – The Facebook user id of the account active for the request * View time – date of execution in Pacific Time * IP – source IP address IP log data is generally retained for 90 days from present date. However, this data source is under active and major redevelopment and data may be retained for a longer or shorter period. Special Requests The Facebook Security Team may be able to retrieve specific information not addressed in the general categories above. Please contact Facebook if you have a specific investigative need prior to issuing a subpoena or warrant.
  • Comcast The Comcast document is labeled "Comcast Cable Law Enforcement Handbook," and is dated 2007, so there's a possibility that it, too, has been superseded. As with the other documents, it explains how law enforcement agenices can get information, and details what information is available. There's a great deal of detail in the 35-page document, which describes what Internet, phone, and television information will be turned over. For example, here's the IP information it will make available: Comcast currently maintains Internet Protocol address log files for a period of 180 days. If Comcast is asked to respond for information relating to an incident that occurred beyond this period, we will not have responsive information and can not fulfill a legal request. (Comcast can process and respond to preservation requests as outlined below in this Handbook.) As expected, Comcast will also turn over the emails, including attachments, of those who use Comcast's email service, but "In cases involving another entity’s email service or account, Comcast would not have any access to or ability to access customer email in response to a legal request." Information Comcast turns over to law enforcement agencies varies according to the request. For example, a grand jury subpoena will yield more information than a judicial summons, as you can see in the excerpt below. Comcast notes, though, that this is just a sample, and that "Each request is evaluated and reviewed on a case by case basis in light of any special procedural or legal requirements and applicable laws." So the examples "are for illustration only."
  • For those who worry about privacy, though, all of this information is small potatoes. The real worry is about the use of what are called pen registers or trap-and-trace devices, which essentially capture all of your Internet activity --- the Web sites you visits, the emails you send and receive, IM traffic, downloads, and so on. Here's what the document says about them: Pen Register / Trap and Trace Device Title 18 U.S.C. § 3123 provides a mechanism for authorizing and approving the installation and use of a pen register or a trap and trace device pursuant to court order. All orders must be coordinated prior to submission to Comcast. Law enforcement will be asked to agree to reimburse Comcast's reasonable costs incurred to purchase and/or install and monitor necessary equipment. See "Reimbursement," below.
  • ...2 more annotations...
  • As for your voice calls made via Comcast, here's what the company will turn over: Call Detail Records - Comcast maintains two years of historical call detail records (records of local and long distance connections) for our Comcast Digital Voice telephone service. This includes local, local toll, and long distance records. Comcast also currently provides traditional circuit-switched telephone service branded Comcast Digital Phone. Call detail records for this service are collected by AT&T and are available for approximately two years as well. To determine which type of service is involved, contact the Legal Demands Center—Voice and Video at 800-871-6298. Account Records - Account records are generally stored for approximately two years after the termination of an account. If the account has an outstanding balance due, records may be retained for a longer period of time. As with Internet information, what phone information will be turned over depends on the specific kind of legal request, and the examples "are for information only." Here's an excerpt:
  • And, as you would expect, there is the same pen register/trap-and-trace device language as in the section about the Internet. Oddly enough, it appears that when it comes to information about your television viewing habits, you have more privacy rights than you do when it comes to information about your Internet and voice use, because it can only be turned over in response to a court order, not a subpoena. Here's what the document has to say about TV information: Subscriber Account Identification and Related Records For subscribers to our cable television service, the Cable Act requires Comcast as a cable operator to disclose personally identifiable information to a governmental entity solely in response to a court order (and not, for example, a subpoena) or with the subscriber's express written consent. The Cable Act requires that the cable subscriber be afforded the opportunity to appear and contest in a court proceeding relevant to the court order any claims made in support of the court order. At the proceeding, the Cable Act requires the governmental entity to offer clear and convincing evidence that the subject of the information is reasonably suspected of engaging in criminal activity and that the information sought would be material evidence in the case. See 47 U.S.C. § 551(h). Why does the law give you more privacy protection over your television viewing habits than your Internet or phone use? I haven't a clue --- ask your congressman.
  •  
    Wonder what information Facebook and Comcast will turn over to police and intelligence agencies about you? Cryptome, the site that last week posted the leaked Microsoft "spy" manual, has posted company documents that purport to describe what those companies will reveal about you. As with the Microsoft document, the information is eye-opening.
Skeptical Debunker

Time for Democrats to take a risk - CNN.com - 0 views

  • Reconciliation was created through the Budget Reform Act of 1974 in an effort to streamline the budget process, strengthen the ability of Congress to make tough decisions regarding deficits, and to make legislative decision-making more efficient. Congress quickly expanded on the types of measures that could be considered under reconciliation until 1985 and 1986, when the Senate passed rules proposed by Sen. Robert Byrd that limited what could or could not be included when using this process. Before moving forward, Democrats must consider two questions. The first is whether using reconciliation to pass health care is legitimate or an abuse of the process. Republicans have charged that this would be akin to forcing the program through the chamber rather than passing the bill through negotiation and compromise. On this question, the answer is easy. Reconciliation has been as much a part of the Senate in the past three decades as the filibuster. According to an article that was published in The New Republic, Congress passed 22 reconciliation bills between 1980 and 2008. Many important policy changes were enacted through this process, including the Children's Health Insurance Program, COBRA (which allows people who switch jobs to keep their health care), student aid reform, expansions in Medicaid and several major tax cuts. NPR's Julie Rovner reported that most of the health care reforms enacted in the past two decades have gone through reconciliation. President Ronald Reagan was one of the first presidents to make aggressive use of reconciliation when he pushed through his economic program in 1981. Senate Majority Leader Howard Baker said then that speed had been essential because "Every day that this is delayed makes it more difficult to pass. This is an extraordinary proposal, and these are extraordinary times." Presidents Jimmy Carter, George H.W. Bush, Bill Clinton and George W. Bush all used reconciliation as well. It is worth noting that these presidents, particularly George W. Bush, also made use of sweeping executive power to circumvent Congress altogether. The second question is more difficult and it involves perceptions. If the Democratic leadership wants to use this tactic, they have to convince enough members of their own party that this won't scare off independent voters. This argument was harder to make in 2009 than in 2010. But after a year of dealing with paralysis in the Senate and highly effective Republican obstruction, more Democrats are coming on board. The leadership must be proactive in responding to the criticism about reconciliation. They will have to explain that reconciliation is a legitimate process by pointing to the history. They will also have to connect the dots for voters frustrated with the ineffective government by explaining that the constant use of the filibuster has turned the Senate into a supermajority institution where both parties have found it extraordinarily difficult -- virtually impossible -- to pass major legislation.On this point, Republicans and Democrats actually agree. Indeed, as Democrats make this decision, Kentucky Republican Senator Jim Bunning is objecting to a unanimous consent order and single-handedly preventing the Senate from passing an important bill to assist unemployed workers.
  •  
    After the Republicans and Democrats met at the White House summit on health care, it was clear that the parties are very far away from a bipartisan agreement. Indeed, few participants walked away with the sense that they were any closer to a deal. The White House did make clear that it was willing to move forward on health care without Republican support. The choice now becomes whether Democrats should use the budget reconciliation process to pass some parts of health care legislation. According to recent reports, Democrats are considering having the House pass the bill that was already approved in the Senate and then dealing with a package of additional reforms through reconciliation.
  •  
    Get that? The current "god" of conservatism - Ronald Reagan - used reconciliation aggressively. So if it was good enough for him ...
peoples movement

English - Oppose H.R. 2499: The Puerto Rico Democracy Act of 2009 - 0 views

  •  
    The "Puerto Rico Democracy Act of 2009" (HR 2499) is not the product of consensus and should be opposed. Let your voice be heard!
‹ Previous 21 - 39 of 39
Showing 20 items per page