Skip to main content

Home/ Politically Minded/ Group items tagged have

Rss Feed Group items tagged

thinkahol *

Washington Okays Attack on Unarmed US Gaza Flotilla Ship - 0 views

  •  
    The Obama administration appears to have given a green light to an Israeli attack on an unarmed flotilla carrying peace and human rights activists - including a vessel with 50 Americans on board - bound for the besieged Gaza Strip. At a press conference on June 24, Secretary of State Hillary Clinton criticized the flotilla organized by the Free Gaza Campaign by saying it would "provoke actions by entering into Israeli waters and creating a situation in which the Israelis have the right to defend themselves." Clinton did not explain why a country had "the right to defend themselves" against ships which are clearly no threat. Not only have organizers of the flotilla gone to great steps to ensure are there no weapons on board, the only cargo bound for Gaza on the US ship are letters of solidarity to the Palestinians in that besieged enclave who have suffered under devastating Israeli bombardments, a crippling blockade, and a right-wing Islamist government. Nor did Clinton explain why the State Department suddenly considers the Mediterranean Sea off the coast of the port of Gaza to be "Israeli waters," when the entire international community recognizes Israeli territorial waters as being well to the northeast of the ships' intended route.
Skeptical Debunker

Rough Water - 0 views

  • For most of the last 1,500 years, the river supported a sustainable salmon economy. Salmon were at the heart of all the Klamath’s tribal cultures, and Indians were careful not to over-harvest them. Each summer, the lower Klamath’s Yurok and Hoopa tribes blocked the upstream paths of spawning salmon with barriers; then, after ten days of fishing, they removed the barriers, allowing upstream tribes to take their share. As the salmon completed their lifecycle, dying in the waters where they’d been spawned, they enriched the watershed with nutrients ingested during years in the ocean. Among the beneficiaries were at least 22 species of mammals and birds that eat salmon. Even the salmon carcasses that bears left behind on the riverbanks fertilized trees that provided shade along the river’s banks, cooling its waters so that the next generation of vulnerable juvenile salmon could survive. “We tried to go to court, to go through the political process, but it didn’t work. …The big issues were still out there, and we still had to resolve them.” Salmon’s biological family may have started in the age of dinosaurs a hundred million years ago. They’ve survived through heat waves and droughts, in rivers of varying flow, temperature, and nutrient load – but they were as ill-prepared for Europeans’ arrival as the Indians themselves. Gold miners who showed up in the mid-nineteenth century washed entire hillsides into the river with high-pressure hoses and scoured the river’s bed with dredges. Loggers dragged trees down streambeds, causing massive erosion, and dumped sawdust into the river, smothering incubating salmon eggs. Cattle grazed at the river’s edge, causing soil erosion and destroying shade-giving vegetation. Farmers diverted water to feed their crops. The dams were the crowning blows. Between 1908 and 1962, six dams were built on the Klamath. The tallest, the 173-foot-high Iron Gate, is the farthest downstream, and definitively blocked salmon from the river’s upper quarter – after it was built, the river’s salmon population plummeted. In addition, the dams devastated water quality by promoting thick growths of toxic algae in the reservoirs. For Klamath basin farmers, however, the dams were deemed indispensable, as they generated hydropower that made pumping of their irrigation water possible.To the farmers, the potential loss of the dams’ hydropower was considered no less crippling than an end to Klamath-supplied irrigation.
  • For most of the last century, the farmers were oblivious to the damage that dams and water diversions caused downstream, while the tribes and commercial fishermen quietly seethed. The annual salmon run, once so abundant that people caught fish with their hands, was roughly pegged at more than a million fish at its peak; in recent years it has dropped to perhaps 200,000 in good years, and as low as 12,000 – below the minimum believed necessary to sustain the runs – in bad years. Spring Chinook, which once comprised the river’s dominant salmon run, entirely disappeared. Two fish species – the Lost River sucker and the shortnose sucker – that once supported a commercial fishery, were listed as endangered in 1988. Coho salmon were listed as threatened nine years later. All this has had a devastating impact on the tribes. Traditionally able to sustain themselves throughout the year on seasonal migrations of the river’s salmon, trout, and candlefish, tribal members suffered greatly as the runs declined or went extinct. For four decades beginning in 1933, the tribes were barred from fishing the river even as commercial fishermen went unrestricted. Members of the Karuk tribe once consumed an estimated average of 450 pounds of salmon a year; a 2004 survey found that the average had dropped to five pounds a year. The survey linked salmon’s absence to epidemics of diabetes and heart disease that now plague the Karuk. The 2001 cutoff left farmers without irrigated water for the first time in the Klamath Project’s history. Over the next four months, many farmers performed repeated acts of civil disobedience, most notably when a bucket brigade passed pails of banned water from its lake storage to an irrigation canal while thousands of onlookers cheered. The protests attracted Christian-fundamentalist, anti-government, and property rights advocates from throughout the West; former Idaho Congresswoman Helen Chenoweth-Hage likened the farmers’ struggle to the American Revolution.
  • ...3 more annotations...
  • A year later, it was the tribes’ and fishermen’s turn to experience calamity. According to a Washington Post report, Vice President Dick Cheney ordered Interior Department officials to deliver Klamath water to Project farmers in 2002, even though federal law seemed to favor the fish. Interior Secretary Gale Norton herself opened the head gates launching the 2002 release of water to the Project, while approving farmers chanted, “Let the water flow!” Six months later, the carcasses of tens of thousands of Chinook and Coho salmon washed up on the riverbanks near the Klamath’s mouth, in what is considered the largest adult salmon die-off in the history of the American West. The immediate cause was a parasitic disease called ich, or “white spot disease,” commonly triggered when fish are overcrowded. Given the presence of an unusually large fall Chinook run in 2002 and a paucity of Klamath flow, the 2002 water diversion probably caused the die-off. Yurok representatives said that months earlier they begged government officials to release more water into the lower river to support the salmon, but were ignored. photo courtesy Earthjustice In 2002, low water levels on the Klamath led to the largest adult salmon die-off in the history of the American West. The die-off deprived many tribes-people of salmon and abruptly ended the river’s sport-fishing season, but its impact didn’t fully register until four years later, when the offspring of the prematurely deceased 2002 salmon would have made their spawning run. By then the Klamath stock was so depleted that the federal government placed 700 miles of Pacific Ocean coastline, from San Francisco to central Oregon, off limits to commercial salmon fishing for most of the 2006 fishing season. As a result, commercial ocean fishermen lost about $100 million in income, forcing many into bankruptcy. Even more devastating, a precipitous decline in Sacramento River salmon led to the cancellation of the entire Pacific salmon fishing season in both 2008 and 2009. The Klamath basin was in a permanent crisis. It turned out that desperation and frustration were perfect preconditions for negotiations. “Every one of us would have rolled the others if we could have,” Fletcher, the Yurok leader, says. “We all tried to go to court, to go through the political process, but it didn’t work – we might win one battle today and lose one tomorrow, so nothing was resolved. We spent millions of dollars on attorneys, plane tickets to Washington, political donations, but it didn’t make any of us sleep any better, because the big issues were still out there, and we still had to resolve them.”
  • In January 2008, the negotiators announced the first of two breakthrough Klamath pacts: the 255-page Klamath Basin Restoration Agreement. In it, most of the parties – farmers, three of the four tribes, a commercial fishermen’s group, seven federal and state agencies, and nine environmental groups – agreed to a basic plan. It includes measures to take down the four dams, divert some water from Project farmers to the river in return for guaranteeing the farmers’ right to a smaller amount, restore fisheries habitat, reintroduce salmon to the upper basin, develop renewable energy to make up for the loss of the dams, and support the Klamath Tribes of Oregon’s effort to regain some land lost when Congress “terminated” its reservation in 1962. This was a seminal moment, a genuine reconciliation among tribal and agricultural leaders who discovered that the hatred they’d nursed was unfounded. “Trust is the key,” says Kandra, the Project farmer who went from litigant to negotiator. “We took little baby steps, giving each other opportunities to build trust, and then we got to a place where we could have some really candid discussions, without screaming and yelling – it was like, ‘Here’s how I see the world.’ Pretty valuable stuff. The folks that developed those kinds of relationships got along pretty good.” Still, one crucial ingredient was missing: Unless PacifiCorp agreed to dismantle the dams, river restoration was impossible, and the pact was a well-intentioned, empty exercise. But PacifiCorp now had compelling reasons to consider dam removal. Not only was relicensing going to be expensive, but Klamath tribespeople were becoming an embarrassing irritant, in two consecutive years interrupting Berkshire Hathaway’s annual-meeting/Buffett-lovefests in Omaha with nonviolent protests that won media attention. Also, the Bush administration, customarily no friend of dam removal, signaled its support for a basin-wide agreement. Negotiations between PacifiCorp and mid-level government officials began in January 2008, but made little progress until a meeting in Shepherdstown, West Virginia four months later, when for the first time Senior Interior Department Counselor Michael Bogert presided. As Bogert recently explained, President Bush himself took an interest in the Klamath “because it was early on in his watch that the Klamath became almost a symbol” of river basin dysfunction. To Bush, the decision to support dam removal was a business decision, not an environmental one: The “game-changer,” Bogert said, was the realization that because of the high cost of relicensing, dam removal made good fiscal sense for PacifiCorp. That fact distinguished the Klamath from other dam removal controversies such as the battle over four dams on Idaho’s Snake River, whose removal the Bush administration continued to oppose.
  • In November 2008, when then-Interior Secretary Dirk Kempthorne announced a detailed agreement in principle with PacifiCorp to take down the dams, he acknowledged that he customarily opposed dam removal, but that the Klamath had taught him “to evaluate each situation on a case-by-case basis.” In September 2009, Kempthorne’s successor, Ken Salazar, announced that PacifiCorp and government officials had reached a final agreement. PacifiCorp and the many signers of the earlier Klamath Basin Restoration Agreement then ironed out inconsistencies between the two pacts in a final negotiation that ended with a final deal in January 2010.
  •  
    Maybe the Klamath River basin would have turned itself around without Jeff Mitchell. Back in 2001, at the pinnacle of the conflict over the river's fate, when the Klamath earned its reputation as the most contentious river basin in the country, Mitchell planted a seed. Thanks to a drought and a resulting Interior Department decision to protect the river's endangered fish stocks, delivery of Klamath water to California and Oregon farmers was cut off mid-season, and they were livid. They blamed the Endangered Species Act, the federal government that enforced it, and the basin's salmon-centric Indians who considered irrigation a death sentence for their cultures. The basin divided up, farmers and ranchers on one side, Indians and commercial fishermen on the other. They sued one another, denounced one another in the press, and hired lobbyists to pass legislation undermining one another. Drunken goose-hunters discharged shotguns over the heads of Indians and shot up storefronts in the largely tribal town of Chiloquin, Oregon. An alcohol-fueled argument over water there prompted a white boy to kick in the head of a young Indian, killing him.
Skeptical Debunker

Unintended Consequences: Twelve Years under the DMCA | Electronic Frontier Foundation - 0 views

  • The DMCA Chills Free Expression and Scientific Research. Experience with section 1201 demonstrates that it is being used to stifle free speech and scientific research. The lawsuit against 2600 magazine, threats against Princeton Professor Edward Felten's team of researchers, and prosecution of Russian programmer Dmitry Sklyarov have chilled the legitimate activities of journalists, publishers, scientists, students, programmers, and members of the public. The DMCA Jeopardizes Fair Use. By banning all acts of circumvention, and all technologies and tools that can be used for circumvention, the DMCA grants to copyright owners the power to unilaterally eliminate the public's fair use rights. Already, the movie industry's use of encryption on DVDs has curtailed consumers' ability to make legitimate, personal-use copies of movies they have purchased. The DMCA Impedes Competition and Innovation. Rather than focusing on pirates, some have wielded the DMCA to hinder legitimate competitors. For example, the DMCA has been used to block aftermarket competition in laser printer toner cartridges, garage door openers, and computer maintenance services. Similarly, Apple has used the DMCA to tie its iPhone and iPod devices to Apple's own software and services. The DMCA Interferes with Computer Intrusion Laws. Further, the DMCA has been misused as a general-purpose prohibition on computer network access, a task for which it was not designed and to which it is ill-suited. For example, a disgruntled employer used the DMCA against a former contractor for simply connecting to the company's computer system through a virtual private network ("VPN").
  •  
    Since they were enacted in 1998, the "anti-circumvention" provisions of the Digital Millennium Copyright Act ("DMCA"), codified in section 1201 of the Copyright Act, have not been used as Congress envisioned. Congress meant to stop copyright infringers from defeating anti-piracy protections added to copyrighted works and to ban the "black box" devices intended for that purpose.1 In practice, the anti-circumvention provisions have been used to stifle a wide array of legitimate activities, rather than to stop copyright infringement. As a result, the DMCA has developed into a serious threat to several important public policy priorities:
thinkahol *

Surprise, Surprise: Iraq War Was About Oil | Truthout - 0 views

  •  
    Afghanistan may be the graveyard of empires, but Iraq is home to a graveyard sense of humor. Iraqis wonder aloud whether the U.S. and Britain would have invaded Iraq if its main export had been cabbages instead of oil. However obvious the answer, a remarkable array of American pundits and pseudo-savants have resisted giving the oil factor any pride of place among the motives behind the U.S./U.K. decision to invade Iraq in 2003. To this day, the Fawning Corporate Media (FCM) continues to play its accustomed role as government accomplice suppressing unwelcome news. So, if you don't tune in to Amy Goodman's Democracy Now or read the British press, you would have missed the latest documentary evidence showing that Great Britain's Lords and Ladies lied about how big oil companies, like BP, lusted after Iraqi oil in the months leading up to the attack on Iraq. Oil researcher Greg Muttitt's new book Fuel on Fire: Oil and Politics in Occupied Iraq presents that evidence, since Muttitt had better luck than his American counterparts in getting responses to his Freedom of Information requests. After a five-year struggle, he obtained more than 1,000 official documents which - how to say this - do not reflect well on the peerage, the captains of the oil industry, and the government of Tony Blair.
Muslim Academy

How to learn Tajweed - 0 views

  •  
    If you have ever wondered how to learn Tajweed which is the proper pronunciation, when reading the Koran there are numerous ways at a student's disposal these days. Everything from a classroom setting to online courses to YouTube videos to podcasts, so there is a way for almost everyone to conveniently learn Tajweed. However, how to learn Tajweed can be overwhelming. It is suggested that the beginner, start by learning the Arabic alphabet as the only true way to learn the rules of tajweed is in the pure Arabic form. The latest on the Arabic alphabet are just as numerous everything from videos on YouTube to online instructions to interactive CD-ROMs to books. Once you have learned in the Arabic alphabet sufficiently then you can start to learn the manners of the heart, which are the rules that govern the Koran itself. Once you have mastered those, you can then start to learn. The external manners which are the rules that govern the person doing the recitation, and teach that individual how to conduct him or herself while reading the Koran.
Ian Schlom

Pakistan urges US to end drone strikes - 0 views

  •  
    inarticle: Pakistan is holding talks with the United States to end drone strikes against suspected Taliban fighters, which sometimes also kill civilians, a senior Pakistani official has said. "Drone attacks are against sovereignty of Pakistan, against international law and against the UN charter," Jalil Abbas Jilani, the administrative head of Pakistan's Foreign Ministry told members of Parliament in Islamabad, the capital. "Innocent people have been killed in these attacks," Jilani said on Friday, adding; "We are having talks with the US to stop the drone attacks and we hope for a positive outcome of the dialogue and hope that drone attacks will stop." The attacks, which are operated by the Central Intelligence Agency (CIA), have strained Pakistan's relations with the US. Pakistan says the attacks violate its sovereignty.
Muslim Academy

Response - A Response to Islamophobia World - 0 views

  •  
    Islam is a balanced religion. It believes in respecting all sects, all cultures and all civilizations. All laws relate to Islam are meant for Muslim benefits . It is true that in the recent years, Islam has become a victim of extremism. The purpose of Islam has never been to spread Islamophobia. Islamic ideas have been exploited to give them the shape of Islamophobia. Islam does not define a mosque and state as distinctive. A mosque is there, to provide a forum to the Muslim to unite and pray. The gesture is to promote congregational prayers, which is also an aspect of Christianity. Islam does not believe in forcing its concepts upon Non-Muslims. Unethical Jehad has never been an Islamic thought. It is just that some extremist groups are trying to manipulate Islam and use the Ideals to their benefit. Islam believes in respecting all religions. That is what the Holy Prophet (PBUH) taught the Muslims. Islam does not preach unkindness to any. May it be your enemy or slave. These are not the aspects of Jihad. A woman can legally have a physical relationship with her husband only. It is definitely no concept of Jihad. Islam believes in respecting a woman, not exploiting her dignity and respect. Islam does not allow illegal confiscation of property during Jihad. Islam does not promote destruction. Taxes does not mean degrading. Taxes are defined to establish a system and maintain a proper division of wealth. If Christian and jews had to pay Jiziah, Muslims had to pay Zakat .Brutality is not a custom of Islam. A Muslim derives so much contentment from Islamic values, that they do not need to run away from the religion. Anything , which drives a person from sanity is not liked in Islam. The reason being that all wrongs can be committed, when a person is drunk and is not in a normal state of mind. This is human nature, that we cannot drive contentment until we avenge someone for the bad they have done to us. However Islam prefers forgiveness. Sometimes a harsh punishment
thinkahol *

Armed Chinese Troops in Texas! - YouTube - 0 views

  •  
    NOTE: It is important to separate hunting down terrorists who attack our country and deserve justice (which Ron Paul is 100% for), and not confuse justice with occupying entire countries for a decade under the guise of the "War on Terror" or "Spreading Democracy". Terrorists are individuals and small groups, so why are we picking fights with entire nations? BILLIONS for Defense, NOT A PENNY for Empire. This speech is called "Imagine" and it was given by Ron Paul on March 11, 2009. The original text of the talk is below: Imagine for a moment that somewhere in the middle of Texas there was a large foreign military base, say Chinese or Russian. Imagine that thousands of armed foreign troops were constantly patrolling American streets in military vehicles. Imagine they were here under the auspices of "keeping us safe" or "promoting democracy" or "protecting their strategic interests." Imagine that they operated outside of US law, and that the Constitution did not apply to them. Imagine that every now and then they made mistakes or acted on bad information and accidentally killed or terrorized innocent Americans, including women and children, most of the time with little to no repercussions or consequences. Imagine that they set up checkpoints on our soil and routinely searched and ransacked entire neighborhoods of homes. Imagine if Americans were fearful of these foreign troops, and overwhelmingly thought America would be better off without their presence. Imagine if some Americans were so angry about them being in Texas that they actually joined together to fight them off, in defense of our soil and sovereignty, because leadership in government refused or were unable to do so. Imagine that those Americans were labeled terrorists or insurgents for their defensive actions, and routinely killed, or captured and tortured by the foreign troops on our land. Imagine that the occupiers' attitude was that if they just killed enough Americans, the resistance would stop, but inst
thinkahol *

Why Big Media Is Going Nuclear Against The DMCA | TechCrunch - 0 views

  •  
    When Congress updated copyright laws and passed the Digital Millennium Copyright Act (DMCA) in 1998, it ushered an era of investment, innovation and job creation.  In the decade since, companies like Google, YouTube and Twitter have emerged thanks to the Act, but in the process, they have disrupted the business models and revenue streams of traditional media companies (TMCs).  Today, the TMCs are trying to fast-track a couple of bills in the House and Congress to reverse all of that. Through their lobbyists in Washington, D.C., media companies are trying to rewrite the DMCA through two new bills.  The content industry's lobbyists have forged ahead without any input from the technology industry, the one in the Senate is called Protect IP and the one in the House is called E-Parasites.  The E-Parasite law would kill the safe harbors of the DMCA and allow traditional media companies to attack emerging technology companies by cutting off their ability to transact and collect revenue, sort of what happened to Wikileaks, if you will.  This would scare VCs from investing in such tech firms, which in turn would destroy job creation. The technology industry is understandably alarmed by its implications, which include automatic blacklists for any site issued a takedown notice by copyright holders that would extend to payment providers and even search engines.   What is going on and how exactly did we get here?
Fay Paxton

Memo to Republican Men: Get Knocked up or STFU |The Political Pragmatic - 0 views

  •  
    Even stupid, self-centered Republican men have the right to their beliefs, I just don't want them imposed on me. Besides, I respect the opinions of people who speak from experience and have a stake in the outcome of the problem they seek to resolve. To my way of thinking, if Republican men really want to have credibility about the abortion issue, then they should get knocked up. Until then, I for one would appreciate it if they would just shut the f**k up.
thinkahol *

The Seductions Of Clicking: How The Internet Can Make It Harder To Act - 0 views

  •  
    Without online technologies, Barack Obama would never have gotten past the primaries. Had Facebook, YouTube, texting, a 13-million name email list and a website developed by Facebook co-founder Chris Hughes been absent from his campaign, he would never have raised enough money, been seen and heard by enough people, or enlisted enough volunteers. Yet progressive hopes are faltering, not only because of Obama's compromises and mistakes and Republican intransigence, but also because far too many of his supporters have come to believe they can act exclusively through these online technologies, to the exclusion of face-to-face politics.
thinkahol *

Elections and ideology: Liberals, planning and trains | The Economist - 0 views

  •  
    Fundamentally, without major government commitments to high-speed rail, America simply will not have a high-speed passenger rail network. This should probably be discomfiting, since every other economic superpower (the EU, Japan and China) does have a high-speed rail network. That makes America look a bit backward. The time horizon for building such a network is several decades, and it's interesting to think about what will happen in the middle decades of this century if air transport becomes unaffordable due to high fuel costs and America doesn't have an electric alternative for high-speed intercity transit.
thinkahol *

No evidence that WikiLeaks releases have hurt anyone - 11/28/2010 | MiamiHerald.com - 0 views

  •  
    American officials in recent days have warned repeatedly that the release of documents by WikiLeaks could put people's lives in danger. But despite similar warnings before the previous two releases of classified U.S. intelligence reports by the website, U.S. officials concede that they have no evidence to date that the documents led to anyone's death.
Skeptical Debunker

Leaked intelligence documents: Here's what Facebook and Comcast will tell the police ab... - 0 views

  • The "Facebook Subpoena/Search Warrant Guidelines" from the Cryptome site are dated 2008, so there's a chance they've been superseded. The document spells out how law enforcement and intelligence agenices should go about requesting information about Facebook users, and details what information is turned over. Following is what Facebook will turn over about you, taken verbatim from the guide: Types of Information Available User Neoprint The Neoprint is an expanded view of a given user profile. A request should specify that they are requesting a “Neoprint of used Id XXXXXX”. User Photoprint The Photoprint is a compilation of all photos uploaded by the user that have not been deleted, along with all photos uploaded by any user which have the requested user tagged in them. A request should specify that they are requesting a “Photoprint of user Id XXXXXX”. User Contact Info All user contact information input by the user and not subsequently deleted by the user is available, regardless of whether it is visible in their profile. This information may include the following: Name Birth date Contact e-mail address(s) Physical address City State Zip Phone Cell Work phone Screen name (usually for AOL Messenger/iChat) Website With the exception of contact e-mail and activated mobile numbers, Facebook validates none of this information. A request should specify that they are requesting "Contact information of user specified by [some other piece of contact information]". No historical data is retained. Group Contact Info Where a group is known, we will provide a list of users currently registered in a group. We will also provide a PDF of the current status of the group profile page. A request should specify that they are requesting "Contact information for group XXXXXX". No historical data is retained. IP Logs IP logs can be produced for a given user ID or IP address. A request should specify that they are requesting the "IP log of user Id XXXXXX" or "IP log of IP address xxx.xxx.xxx.xxx". The log contains the following information: * Script – script executed. For instance, a profile view of the URL http://www.facebook.com/profile.php?id=29445421 would populate script with "profile.php" * Scriptget – additional information passed to the script. In the above example, scriptget would contain "id=29445421" * Userid – The Facebook user id of the account active for the request * View time – date of execution in Pacific Time * IP – source IP address IP log data is generally retained for 90 days from present date. However, this data source is under active and major redevelopment and data may be retained for a longer or shorter period. Special Requests The Facebook Security Team may be able to retrieve specific information not addressed in the general categories above. Please contact Facebook if you have a specific investigative need prior to issuing a subpoena or warrant.
  • Comcast The Comcast document is labeled "Comcast Cable Law Enforcement Handbook," and is dated 2007, so there's a possibility that it, too, has been superseded. As with the other documents, it explains how law enforcement agenices can get information, and details what information is available. There's a great deal of detail in the 35-page document, which describes what Internet, phone, and television information will be turned over. For example, here's the IP information it will make available: Comcast currently maintains Internet Protocol address log files for a period of 180 days. If Comcast is asked to respond for information relating to an incident that occurred beyond this period, we will not have responsive information and can not fulfill a legal request. (Comcast can process and respond to preservation requests as outlined below in this Handbook.) As expected, Comcast will also turn over the emails, including attachments, of those who use Comcast's email service, but "In cases involving another entity’s email service or account, Comcast would not have any access to or ability to access customer email in response to a legal request." Information Comcast turns over to law enforcement agencies varies according to the request. For example, a grand jury subpoena will yield more information than a judicial summons, as you can see in the excerpt below. Comcast notes, though, that this is just a sample, and that "Each request is evaluated and reviewed on a case by case basis in light of any special procedural or legal requirements and applicable laws." So the examples "are for illustration only."
  • For those who worry about privacy, though, all of this information is small potatoes. The real worry is about the use of what are called pen registers or trap-and-trace devices, which essentially capture all of your Internet activity --- the Web sites you visits, the emails you send and receive, IM traffic, downloads, and so on. Here's what the document says about them: Pen Register / Trap and Trace Device Title 18 U.S.C. § 3123 provides a mechanism for authorizing and approving the installation and use of a pen register or a trap and trace device pursuant to court order. All orders must be coordinated prior to submission to Comcast. Law enforcement will be asked to agree to reimburse Comcast's reasonable costs incurred to purchase and/or install and monitor necessary equipment. See "Reimbursement," below.
  • ...2 more annotations...
  • As for your voice calls made via Comcast, here's what the company will turn over: Call Detail Records - Comcast maintains two years of historical call detail records (records of local and long distance connections) for our Comcast Digital Voice telephone service. This includes local, local toll, and long distance records. Comcast also currently provides traditional circuit-switched telephone service branded Comcast Digital Phone. Call detail records for this service are collected by AT&T and are available for approximately two years as well. To determine which type of service is involved, contact the Legal Demands Center—Voice and Video at 800-871-6298. Account Records - Account records are generally stored for approximately two years after the termination of an account. If the account has an outstanding balance due, records may be retained for a longer period of time. As with Internet information, what phone information will be turned over depends on the specific kind of legal request, and the examples "are for information only." Here's an excerpt:
  • And, as you would expect, there is the same pen register/trap-and-trace device language as in the section about the Internet. Oddly enough, it appears that when it comes to information about your television viewing habits, you have more privacy rights than you do when it comes to information about your Internet and voice use, because it can only be turned over in response to a court order, not a subpoena. Here's what the document has to say about TV information: Subscriber Account Identification and Related Records For subscribers to our cable television service, the Cable Act requires Comcast as a cable operator to disclose personally identifiable information to a governmental entity solely in response to a court order (and not, for example, a subpoena) or with the subscriber's express written consent. The Cable Act requires that the cable subscriber be afforded the opportunity to appear and contest in a court proceeding relevant to the court order any claims made in support of the court order. At the proceeding, the Cable Act requires the governmental entity to offer clear and convincing evidence that the subject of the information is reasonably suspected of engaging in criminal activity and that the information sought would be material evidence in the case. See 47 U.S.C. § 551(h). Why does the law give you more privacy protection over your television viewing habits than your Internet or phone use? I haven't a clue --- ask your congressman.
  •  
    Wonder what information Facebook and Comcast will turn over to police and intelligence agencies about you? Cryptome, the site that last week posted the leaked Microsoft "spy" manual, has posted company documents that purport to describe what those companies will reveal about you. As with the Microsoft document, the information is eye-opening.
Yee Sian Ng

Is Europe Irrelevant? | Cato @ Liberty - 0 views

  •  
    It could be argued that the costs to the United States of providing such services for the rest of the world are modest, but that is ultimately a judgment call. To be sure, the dollar costs will not bankrupt us as a nation, but Americans spend $2,700 per person on our military, while the average European spends less than $700. The bottom line is that Europeans have little incentive to spend more because they don't feel particularly threatened, and they aren't anxious to take on responsibilities that are ably handled by the United States. The advocates of hegemonic stability theory would declare that a feature, not a bug. Mission accomplished. And that might be true, if the greatest threat to global security were a resurgence of conflict in Europe, and if it is truly in the U.S. interest to forever have allies with few capabilities and many liabilities. But that seems extremely shortsighted. The sweeping political and economic integration in Europe has dramatically reduced the likelihood of another European war. In the meantime, the fact that we have many allies with little to offer by way of military assets, and even less political will to actually use them, is forcing the U.S. military to bear the disproportionate share of the burdens of policing the planet. And in the medium- to long-term, while I doubt that we will be facing "a militarily superior, post-Soviet Russia," allies with usable military power might ultimately serve a purpose if Moscow proves as aggressive (and capable) as the hawks claim.
Skeptical Debunker

Big Content condemns foreign governments that endorse FOSS - 0 views

  • University of Edinburgh law lecturer Andres Guadamuz wrote a blog entry this week highlighting some particularly troubling aspects of the IIPA's 301 recommendations. The organization has condemned Indonesia and several other countries for encouraging government adoption of open source software. According to the IIPA, official government endorsements of open source software create "trade barriers" and restrict "equitable market access" for software companies. The profound absurdity of this accusation is exacerbated by the fact that Indonesia's move towards open source software was almost entirely motivated by a desire to eliminate the use of pirated software within the government IT infrastructure. It's important to understand that Indonesia has not mandated the adoption of open source software or barred government agencies from purchasing proprietary commercial software. The Indonesian government issued a statement in 2009 informing municipal governments that they had to stop using pirated software. The statement said that government agencies must either purchase legally licensed commercial software or switch to free and open source alternatives in order to comply with copyright law. This attempt by Indonesia to promote legal software procurement processes by endorsing the viability of open source software has apparently angered the IIPA. In its 301 recommendations for Indonesia, the IIPA demands that the government rescind its 2009 statement. According to the IIPA, Indonesia's policy "weakens the software industry and undermines its long-term competitiveness" because open source software "encourages a mindset that does not give due consideration to the value to intellectual creations [and] fails to build respect for intellectual property rights." The number of ways in which the IIPA's statements regarding open source software are egregiously misleading and dishonest are too numerous to count. The IIPA seems to have completely missed the fact that there is a very robust ecosystem of commercial software vendors in the open source software market and that open source software is at the heart of some of the most popular consumer electronics products that are sold in the United States. It has clearly become an important part of the US software economy and increasingly serves as an enabler of innovation and technological progress. In light of the profitability of Red Hat and other open source leaders, it seems absurd to contend that open source software adoption will weaken the software industry or reduce its competitiveness. In fact, the emergence of open source software has contributed to creating a more competitive landscape in the software industry by offering alternative business models that enable smaller companies to gain traction against the dominant incumbent players. The IIPA's position is profoundly hypocritical, because many parts of the US government, including the Department of Defense, have issued their own memos endorsing open source software adoption. The IIPA's disingenuous move to equate open source software with piracy reeks of desperation. The BSA and other IIPA members are likely losing sleep over open source software because that development model and approach to licensing will empower developing countries to build their own domestic IT industries, eliminating the need for them to tithe to American software giants. It's another failing of the 301 review, which Big Content wants used to coerce other countries into adopting ever-more-stringent copyright laws.
  •  
    In accordance with US trade law, the Office of the US Trade Representative (USTR) is required to conduct an annual review of the status of foreign intellectual property laws. This review, which is referred to as Special 301, is typically used to denounce countries that have less restrictive copyright policies than the United States. The review process is increasingly dominated by content industry lobbyists who want to subvert US trade policy and make it more favorable to their own interests. We have already noted the targeting of Canada for its supposedly lax copyright laws, but that is not the only nation drawing the ire of Big Content. One of the organizations that plays a key role in influencing the Special 301 review is the International Intellectual Property Alliance (IIPA), a powerful coalition that includes the RIAA, the MPAA, and the Business Software Alliance (BSA). The IIPA, which recently published its official recommendations to the USTR for the 2010 edition of the 301 review, has managed to achieve a whole new level of absurdity.
Skeptical Debunker

Switzerland Keeping the Secrets of Alleged Tax Evaders - Yahoo! News - 0 views

  • Pick a dictator, almost any dictator - Cuba's Fulgencio Batista, the Philippines' Ferdinand Marcos, Haiti's Papa and Baby Doc Duvalier, the Shah of Iran, Central African Republic Emperor Jean-BÉdel Bokassa - and they all have this in common: they allegedly stashed their loot in secret, numbered accounts in Swiss banks, safely guarded by the so-called Gnomes of Zurich. This association - of bank secrecy and crime - has been fed into the public's imagination by dozens of books and movies. It's a reputation that rankles the Swiss, who have a more benevolent view of their commitment to privacy - one that happens to extend to tax privacy. Don't ask, because we won't tell. But the dramatic federal investigation of Switzerland's UBS has blown the lid off bank secrecy - and revealed how Swiss banks abet tax evasion on a far more widespread, if more banal, level. Over the past two decades, these secret banking services have been peddled progressively downmarket - first to the lesser-known fabulously wealthy, then to just the wealthy; more recently, private bankers have been tripping over themselves soliciting business from doctors, lawyers and other folks who are what the biz generally calls "high net worth" individuals. "The IRS has been concerned for decades that a combination of a global economy, the Internet, offshore banking, was really going to take offshore tax evasion from the old so-called 'gentlemen's sport' to tax evasion for the masses," says Mark Matthews, a former deputy IRS commissioner and now a tax attorney with Morgan, Lewis & Bockius LLP.
  •  
    The federal investigation into UBS, which led to a $780 million fine and an agreement to turn over the names of more than 4,450 suspected tax cheats, is now in tatters after Swiss courts ruled against the executive-branch deal. To get around it, a special law has been proposed to accomplish the handoff, but that may not get anywhere in the legislature either. One outcome is already known: tax evasion had become a key service of the Swiss economy, not some isolated event. "They have been outed completely because a very large chunk of their business has been shown to include people cheating on taxes," says Jack Blum, a tax-haven expert. Being "reasonably conservative," he estimates 30% of Swiss banking is related to tax evasion, a figure that jibes with recently released bank data. These revelations come as the financial meltdown has punched a huge hole in projected revenues for governments, which are suddenly a whole lot less tolerant of tax cheats. That's particularly true in Germany, whose wealthy account for a significant portion (at least 10%) of the $1.8 trillion in Swiss banking assets. That translates into hundreds of millions in lost revenue and is the reason the German Finance Minister recently thundered, "There's no future for bank secrecy. It's finished. Its time has run out." The Swiss are not going to be so easily convinced. The Swiss government has already warned that it will not cooperate with German authorities if they go ahead with plans to purchase purloined data about Germans with Swiss bank accounts.
rich hilts

Shared Sacrifice From The Right? - 0 views

shared by rich hilts on 14 Jan 11 - No Cached
  •  
    Wow - did a conservative just steal the march on the left by using one of their vaunted catch phrases? Similar to "no justice, no peace", the "shared sacrifice" clause has been invoked by many on the left to show where those that have are taking from those that have not and are doing so without care. Don't you love seeing that used back against some of the leaders who have and get and demand and yet don't seem to care where it comes from?
thinkahol *

The American Dream | Watch Free Documentary Online - 0 views

  •  
    The American Dream is a 30 minute animated film that shows you how you've been scammed by the most basic elements of the government system. From the author: All of us Americans strive for the American Dream, and this film shows you why your dream is getting farther and farther away. Do you know how your money is created? Or how banking works? Why did housing prices skyrocket and then plunge? Do you really know what the Federal Reserve System is and how it affects you every single day? The American Dream takes an entertaining but hard hitting look at how the problems we have today are nothing new, and why leaders throughout our history have warned us and fought against the current type of financial system we have in America today. You will be challenged to investigate some very entrenched and powerful institutions in this nation, and hopefully encouraged to help get our nation back on track.
thinkahol *

A "Pledge of Resistance" to Defend Social Security (and Defund the Empire) - 0 views

  •  
    For the third time in the last 20 years, establishment voices with high-profile slots in traditional media are trying to convince the public to accept cuts to Social Security by endlessly claiming such cuts are necessary, without giving coherent evidence to justify the claim. Twice, under former presidents Clinton and George W. Bush, these voices were defeated - but they didn't give up. And now they are in striking distance of their goal: the fact that Republicans have taken over the House, combined with the fact that the president appointed a deficit reduction commission which nearly recommended a cut in Social Security benefits - and might well have done so if Representative Schakowsky hadn't worked to undermine the co-chairs' plan - means that one can't be complacent; some reports have suggested that the president may indicate support for cuts to Social Security in his State of the Union speech. Of the two principal Washington political actors who will shape the outcome - the Republican leadership and the president's team - one is a determined adversary of the public interest, the other a very uncertain ally. The most successful anti-poverty program in US history is again in grave danger.
‹ Previous 21 - 40 of 658 Next › Last »
Showing 20 items per page