Skip to main content

Home/ Politically Minded/ Group items tagged privacy

Rss Feed Group items tagged

Skeptical Debunker

Suspend airport body scanner program, privacy groups say - 0 views

  • Based on the discussions at the event, it is evident that body scanners can be easily defeated by concealing explosive materials in body cavities, the letter says. There is also little information on the health risks posed by the use of such scanners, according to the letter. The fact that the systems can be configured at any time to record and store images of travelers also raises privacy questions, the letter says. "The public does not currently understand the inability of these devices to detect the types of explosive materials that could be used or the possible risks to privacy and health," Rotenberg and Nader wrote. "The Department of Homeland Security has made significant mistakes with similar programs in the past," they added, citing as an example the agency's discontinued effort to equip airports with so-called explosive trace portals (ETP), which are designed to detect traces of explosives on travelers' clothing.
  •  
    "The Electronic Privacy Information Center and consumer advocate Ralph Nader are urging President Obama to review the administration's plans to install whole body scanners at U.S. airports. In a joint letter, Marc Rotenberg, the president of EPIC, and Nader asked the president to suspend deployment of the devices until a "comprehensive evaluation" of the effectiveness of the technology and potential health hazards, is completed."
Skeptical Debunker

Leaked intelligence documents: Here's what Facebook and Comcast will tell the police ab... - 0 views

  • The "Facebook Subpoena/Search Warrant Guidelines" from the Cryptome site are dated 2008, so there's a chance they've been superseded. The document spells out how law enforcement and intelligence agenices should go about requesting information about Facebook users, and details what information is turned over. Following is what Facebook will turn over about you, taken verbatim from the guide: Types of Information Available User Neoprint The Neoprint is an expanded view of a given user profile. A request should specify that they are requesting a “Neoprint of used Id XXXXXX”. User Photoprint The Photoprint is a compilation of all photos uploaded by the user that have not been deleted, along with all photos uploaded by any user which have the requested user tagged in them. A request should specify that they are requesting a “Photoprint of user Id XXXXXX”. User Contact Info All user contact information input by the user and not subsequently deleted by the user is available, regardless of whether it is visible in their profile. This information may include the following: Name Birth date Contact e-mail address(s) Physical address City State Zip Phone Cell Work phone Screen name (usually for AOL Messenger/iChat) Website With the exception of contact e-mail and activated mobile numbers, Facebook validates none of this information. A request should specify that they are requesting "Contact information of user specified by [some other piece of contact information]". No historical data is retained. Group Contact Info Where a group is known, we will provide a list of users currently registered in a group. We will also provide a PDF of the current status of the group profile page. A request should specify that they are requesting "Contact information for group XXXXXX". No historical data is retained. IP Logs IP logs can be produced for a given user ID or IP address. A request should specify that they are requesting the "IP log of user Id XXXXXX" or "IP log of IP address xxx.xxx.xxx.xxx". The log contains the following information: * Script – script executed. For instance, a profile view of the URL http://www.facebook.com/profile.php?id=29445421 would populate script with "profile.php" * Scriptget – additional information passed to the script. In the above example, scriptget would contain "id=29445421" * Userid – The Facebook user id of the account active for the request * View time – date of execution in Pacific Time * IP – source IP address IP log data is generally retained for 90 days from present date. However, this data source is under active and major redevelopment and data may be retained for a longer or shorter period. Special Requests The Facebook Security Team may be able to retrieve specific information not addressed in the general categories above. Please contact Facebook if you have a specific investigative need prior to issuing a subpoena or warrant.
  • Comcast The Comcast document is labeled "Comcast Cable Law Enforcement Handbook," and is dated 2007, so there's a possibility that it, too, has been superseded. As with the other documents, it explains how law enforcement agenices can get information, and details what information is available. There's a great deal of detail in the 35-page document, which describes what Internet, phone, and television information will be turned over. For example, here's the IP information it will make available: Comcast currently maintains Internet Protocol address log files for a period of 180 days. If Comcast is asked to respond for information relating to an incident that occurred beyond this period, we will not have responsive information and can not fulfill a legal request. (Comcast can process and respond to preservation requests as outlined below in this Handbook.) As expected, Comcast will also turn over the emails, including attachments, of those who use Comcast's email service, but "In cases involving another entity’s email service or account, Comcast would not have any access to or ability to access customer email in response to a legal request." Information Comcast turns over to law enforcement agencies varies according to the request. For example, a grand jury subpoena will yield more information than a judicial summons, as you can see in the excerpt below. Comcast notes, though, that this is just a sample, and that "Each request is evaluated and reviewed on a case by case basis in light of any special procedural or legal requirements and applicable laws." So the examples "are for illustration only."
  • For those who worry about privacy, though, all of this information is small potatoes. The real worry is about the use of what are called pen registers or trap-and-trace devices, which essentially capture all of your Internet activity --- the Web sites you visits, the emails you send and receive, IM traffic, downloads, and so on. Here's what the document says about them: Pen Register / Trap and Trace Device Title 18 U.S.C. § 3123 provides a mechanism for authorizing and approving the installation and use of a pen register or a trap and trace device pursuant to court order. All orders must be coordinated prior to submission to Comcast. Law enforcement will be asked to agree to reimburse Comcast's reasonable costs incurred to purchase and/or install and monitor necessary equipment. See "Reimbursement," below.
  • ...2 more annotations...
  • As for your voice calls made via Comcast, here's what the company will turn over: Call Detail Records - Comcast maintains two years of historical call detail records (records of local and long distance connections) for our Comcast Digital Voice telephone service. This includes local, local toll, and long distance records. Comcast also currently provides traditional circuit-switched telephone service branded Comcast Digital Phone. Call detail records for this service are collected by AT&T and are available for approximately two years as well. To determine which type of service is involved, contact the Legal Demands Center—Voice and Video at 800-871-6298. Account Records - Account records are generally stored for approximately two years after the termination of an account. If the account has an outstanding balance due, records may be retained for a longer period of time. As with Internet information, what phone information will be turned over depends on the specific kind of legal request, and the examples "are for information only." Here's an excerpt:
  • And, as you would expect, there is the same pen register/trap-and-trace device language as in the section about the Internet. Oddly enough, it appears that when it comes to information about your television viewing habits, you have more privacy rights than you do when it comes to information about your Internet and voice use, because it can only be turned over in response to a court order, not a subpoena. Here's what the document has to say about TV information: Subscriber Account Identification and Related Records For subscribers to our cable television service, the Cable Act requires Comcast as a cable operator to disclose personally identifiable information to a governmental entity solely in response to a court order (and not, for example, a subpoena) or with the subscriber's express written consent. The Cable Act requires that the cable subscriber be afforded the opportunity to appear and contest in a court proceeding relevant to the court order any claims made in support of the court order. At the proceeding, the Cable Act requires the governmental entity to offer clear and convincing evidence that the subject of the information is reasonably suspected of engaging in criminal activity and that the information sought would be material evidence in the case. See 47 U.S.C. § 551(h). Why does the law give you more privacy protection over your television viewing habits than your Internet or phone use? I haven't a clue --- ask your congressman.
  •  
    Wonder what information Facebook and Comcast will turn over to police and intelligence agencies about you? Cryptome, the site that last week posted the leaked Microsoft "spy" manual, has posted company documents that purport to describe what those companies will reveal about you. As with the Microsoft document, the information is eye-opening.
thinkahol *

The Obama administration's war on privacy - Glenn Greenwald - Salon.com - 0 views

  •  
    Two new Obama proposals would dramatically expand the government's already vast surveillance powers
thinkahol *

U.S. schools: grooming students for a surveillance state | Privacy News - PogoWasRight.org - 0 views

  •  
    Schools are increasingly invading student privacy both in school and outside of school. Are schools grooming youth to passively accept a surveillance state
Joe La Fleur

snopes.com: Michael Connelly on the Constitutionality of Health Care Reform - 0 views

  •  
    IF YOUR FREEDOM AND PRIVACY AARE IMPORTANT TO YOU READ THIS AND PASS IT ON
thinkahol *

Things That Make Me Angry | Thinkahol's Blog - 0 views

  •  
    Wall Street Isn't Winning - It's Cheating The two-tiered justice system: an illustration 9/10/2001: Rumsfeld says $2.3 TRILLION Missing from Pentagon  The due-process-free assassination of U.S. citizens is now reality The Quiet Coup "the finance industry has effectively captured our government" What OWS is about + data behind the movement Data privacy is now extinct in the U.S. "The problem that confronts us is that every living system in the biosphere is in decline and the rate of decline is accelerating. There isn't one peer-reviewed scientific article that's been published in the last 20 years that contradicts that statement. Living systems are coral reefs. They're our climatic stability, forest cover, the oceans themselves, aquifers, water, the conditions of the soil, biodiversity. They go on and on as they get more specific. But the fact is, there isn't one living system that is stable or is improving. And those living systems provide the basis for all life." The 1% are the very best destroyers of wealth the world has ever seen The prison industry in the United States: big business or a new form of slavery? How the GOP Became the Party of the Rich: The inside story of how the Republicans abandoned the poor and the middle class to pursue their relentless agenda of tax cuts for the wealthiest one percent
Skeptical Debunker

The Comprehensive National Cybersecurity Initiative | The White House - 0 views

  • The CNCI consists of a number of mutually reinforcing initiatives with the following major goals designed to help secure the United States in cyberspace: To establish a front line of defense against today’s immediate threats by creating or enhancing shared situational awareness of network vulnerabilities, threats, and events within the Federal Government—and ultimately with state, local, and tribal governments and private sector partners—and the ability to act quickly to reduce our current vulnerabilities and prevent intrusions. To defend against the full spectrum of threats by enhancing U.S. counterintelligence capabilities and increasing the security of the supply chain for key information technologies. To strengthen the future cybersecurity environment by expanding cyber education; coordinating and redirecting research and development efforts across the Federal Government; and working to define and develop strategies to deter hostile or malicious activity in cyberspace.
  •  
    President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we as a government or as a country are not adequately prepared to counter. Shortly after taking office, the President therefore ordered a thorough review of federal efforts to defend the U.S. information and communications infrastructure and the development of a comprehensive approach to securing America's digital infrastructure. In May 2009, the President accepted the recommendations of the resulting Cyberspace Policy Review, including the selection of an Executive Branch Cybersecurity Coordinator who will have regular access to the President. The Executive Branch was also directed to work closely with all key players in U.S. cybersecurity, including state and local governments and the private sector, to ensure an organized and unified response to future cyber incidents; strengthen public/private partnerships to find technology solutions that ensure U.S. security and prosperity; invest in the cutting-edge research and development necessary for the innovation and discovery to meet the digital challenges of our time; and begin a campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms and begin to build the digital workforce of the 21st century. Finally, the President directed that these activities be conducted in a way that is consistent with ensuring the privacy rights and civil liberties guaranteed in the Constitution and cherished by all Americans.
Skeptical Debunker

Switzerland Keeping the Secrets of Alleged Tax Evaders - Yahoo! News - 0 views

  • Pick a dictator, almost any dictator - Cuba's Fulgencio Batista, the Philippines' Ferdinand Marcos, Haiti's Papa and Baby Doc Duvalier, the Shah of Iran, Central African Republic Emperor Jean-BÉdel Bokassa - and they all have this in common: they allegedly stashed their loot in secret, numbered accounts in Swiss banks, safely guarded by the so-called Gnomes of Zurich. This association - of bank secrecy and crime - has been fed into the public's imagination by dozens of books and movies. It's a reputation that rankles the Swiss, who have a more benevolent view of their commitment to privacy - one that happens to extend to tax privacy. Don't ask, because we won't tell. But the dramatic federal investigation of Switzerland's UBS has blown the lid off bank secrecy - and revealed how Swiss banks abet tax evasion on a far more widespread, if more banal, level. Over the past two decades, these secret banking services have been peddled progressively downmarket - first to the lesser-known fabulously wealthy, then to just the wealthy; more recently, private bankers have been tripping over themselves soliciting business from doctors, lawyers and other folks who are what the biz generally calls "high net worth" individuals. "The IRS has been concerned for decades that a combination of a global economy, the Internet, offshore banking, was really going to take offshore tax evasion from the old so-called 'gentlemen's sport' to tax evasion for the masses," says Mark Matthews, a former deputy IRS commissioner and now a tax attorney with Morgan, Lewis & Bockius LLP.
  •  
    The federal investigation into UBS, which led to a $780 million fine and an agreement to turn over the names of more than 4,450 suspected tax cheats, is now in tatters after Swiss courts ruled against the executive-branch deal. To get around it, a special law has been proposed to accomplish the handoff, but that may not get anywhere in the legislature either. One outcome is already known: tax evasion had become a key service of the Swiss economy, not some isolated event. "They have been outed completely because a very large chunk of their business has been shown to include people cheating on taxes," says Jack Blum, a tax-haven expert. Being "reasonably conservative," he estimates 30% of Swiss banking is related to tax evasion, a figure that jibes with recently released bank data. These revelations come as the financial meltdown has punched a huge hole in projected revenues for governments, which are suddenly a whole lot less tolerant of tax cheats. That's particularly true in Germany, whose wealthy account for a significant portion (at least 10%) of the $1.8 trillion in Swiss banking assets. That translates into hundreds of millions in lost revenue and is the reason the German Finance Minister recently thundered, "There's no future for bank secrecy. It's finished. Its time has run out." The Swiss are not going to be so easily convinced. The Swiss government has already warned that it will not cooperate with German authorities if they go ahead with plans to purchase purloined data about Germans with Swiss bank accounts.
thinkahol *

VICTORY! Court Says Plaintiffs Can Challenge Bush Wiretapping Law » Blog of R... - 0 views

  •  
    In a huge victory for privacy and the rule of law, a federal appeals court today reinstated our landmark lawsuit challenging the FISA Amendments Act (FAA), a statute that gives the executive branch virtually unchecked power to collect Americans' international e-mails and telephone calls.
Joe La Fleur

Obamacare's Patient-Dumping, Privacy-Meddling Scheme - Michelle Malkin - Townhall Conse... - 0 views

  •  
    PATIENT DUMPING
thinkahol *

NationalJournal.com - To Tell the Truth - Thursday, December 2, 2010 - 0 views

  • As Ralph Waldo Emerson once said, “God offers to every mind its choice between truth and repose. Take which you please; you can never have both.”
  •  
    Judging by the press accounts, Washington is still buzzing over WikiLeaks' release of classified U.S. government information, with both Republicans and Democrats expressing outrage over the disclosures. Meanwhile, many media outlets seem to be practically mute on the subject, avoiding comment on whether WikiLeaks provided a public service or disservice.
Bakari Chavanu

Capitalism's Self-inflicted Apocalypse - 0 views

  •  The present economic crisis, however, has convinced even some prominent free-marketeers that something is gravely amiss. Truth be told, capitalism has yet to come to terms with several historical forces that cause it endless trouble: democracy, prosperity, and capitalism itself, the very entities that capitalist rulers claim to be fostering.
  • Some eighty  years ago Supreme Court Justice Louis Brandeis commented, “We can have democracy in this country, or we can have great wealth concentrated in the hands of a few, but we can’t have both.” Moneyed interests have been opponents not proponents of democracy.
  • In the early days of the Republic the rich and well-born imposed property qualifications for voting and officeholding. They opposed the direct election of candidates (note, their Electoral College is still with us). And for decades they resisted extending the franchise to less favored groups such as propertyless working men, immigrants, racial minorities, and women.
  • ...17 more annotations...
  • The conservative plutocracy also seeks to rollback democracy’s social gains, such as public education, affordable housing, health care, collective bargaining, a living wage, safe work conditions, a non-toxic sustainable environment; the right to privacy, the separation of church and state, freedom from compulsory pregnancy, and the right to marry any consenting adult of one’s own choosing.
  • About a century ago, US labor leader Eugene Victor Debs was thrown into jail during a strike. Sitting in his cell he could not escape the conclusion that in disputes between two private interests, capital and labor, the state was not a neutral arbiter. The force of the state--with its police, militia, courts, and laws—was unequivocally on the side of the company bosses.
  • Any nation that is not “investor friendly,” that attempts to use its land, labor, capital, natural resources, and markets in a self-developing manner, outside  the dominion of transnational corporate hegemony, runs the risk of being demonized and targeted as “a threat to U.S. national security.”
  • Most of the world is capitalist, and most of the world is neither prosperous nor particularly democratic. One need only think of capitalist Nigeria, capitalist Indonesia, capitalist Thailand, capitalist Haiti, capitalist Colombia, capitalist Pakistan, capitalist South Africa, capitalist Latvia, and various other members of the Free World--more accurately, the Free Market World.
  • Corporate investors prefer poor populations. The poorer you are, the harder you will work—for less. The poorer you are, the less equipped you are to defend yourself against the abuses of wealth.
  • In the corporate world of “free-trade,” the number of billionaires is increasing faster than ever while the number of people living in poverty is growing at a faster rate than the world’s population. Poverty spreads as wealth accumulates.
  • To the extent that life is bearable under the present U.S. economic order, it is because millions of people have waged bitter class struggles to advance their living standards and their rights as citizens, bringing  some measure of humanity to an otherwise heartless politico-economic order.
  • There is a third function of the capitalist state seldom mentioned. It consists of preventing the capitalist system from devouring itself.  Consider the core contradiction Karl Marx pointed to: the tendency toward overproduction and market crisis. An economy dedicated to speedups and wage cuts, to making workers produce more and more for less and less, is always in danger of a crash. To maximize profits, wages must be kept down. But someone has to buy the goods and services being produced. For that, wages must be kept up. There is a chronic tendency—as we are seeing today—toward overproduction of private sector goods and services and underconsumption of necessities by the working populace. 
  • Instead of trying to make money by the arduous task of producing and marketing goods and services, the marauders tap directly into the money streams of the economy itself. During the 1990s we witnessed the collapse of an entire economy in Argentina when unchecked free marketeers stripped enterprises, pocketed vast sums, and left the country’s productive capacity in shambles. The Argentine state, gorged on a heavy diet of free-market ideology, faltered in its function of saving capitalism from the capitalists.
  • These thieves were caught and convicted. Does that not show capitalism’s self-correcting capacity? Not really. The prosecution of such malfeasance— in any case coming too late—was a product of democracy’s accountability and transparency, not capitalism’s. Of itself the free market is an amoral system, with no strictures save caveat emptor.
  • Perhaps the premiere brigand was Bernard Madoff. Described as “a longstanding leader in the financial services industry,” Madoff ran a fraudulent fund that raked in $50 billion from wealthy investors, paying them back “with money that wasn’t there,” as he himself put it. The plutocracy devours its own children.
  • The classic laissez-faire theory is even more preposterous than Greenspan made it.  In fact, the theory claims that everyone should pursue their own selfish interests without restraint.
  • Capitalism breeds the venal perpetrators, and rewards the most unscrupulous among them.  The crimes and crises are not irrational departures from a rational system, but the converse: they are the rational outcomes of a basically irrational and amoral system.
  • Worse still, the ensuing multi-billion dollar government bailouts are themselves being turned into an opportunity for pillage. Not only does the state fail to regulate, it becomes itself a source of plunder, pulling vast sums from the federal money machine, leaving the taxpayers to bleed.
  • But the 2008-09 “rescue operation” offered a record feed at the public trough. More than $350 billion was dished out by a right-wing lame-duck Secretary of the Treasury to the biggest banks and financial houses without oversight--not to mention the more than $4 trillion that has come from the Federal Reserve.  Most of the banks, including JPMorgan Chase and Bank of New York Mellon, stated that they had no intention of letting anyone know where the money was going.
  • In sum, free-market corporate capitalism is by its nature a disaster waiting to happen.
  • If the paladins of Corporate America want to know what really threatens “our way of life,” it is their way of life, their boundless way of pilfering their own system, destroying the very foundation on which they stand, the very community on which they so lavishly feed.
1 - 12 of 12
Showing 20 items per page