Skip to main content

Home/ Politically Minded/ Group items matching "connects" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
thinkahol *

Study shows that one 'super-corporation' pulls the strings of the global economy | Mail Online - 0 views

  •  
    A University of Zurich study 'proves' that a small group of companies - mainly banks - wields huge power over the global economy. The study is the first to look at all 43,060 transnational corporations and the web of ownership between them - and created a 'map' of 1,318 companies at the heart of the global economy. The study found that 147 companies formed a 'super entity' within this, controlling 40 per cent of its  wealth. All own part or all of one another. Most are banks - the top 20 includes Barclays and Goldman Sachs. But the close connections mean that the network could be vulnerable to collapse
Arabica Robusta

Populism and the enchanted world of 'moderate politics' | openDemocracy - 1 views

  • I essentially question the epistemological flaws surrounding the uses of the notion: when is it safe to call a politician, a political party or movement ‘populist’?
  • The stakes are high because to label someone as ‘populist’ is to imply that s/he is somehow a potential or real enemy of representative democracy. My critic refers to the ‘pernicious effects’ of populism which underlines the notion’s very negative connotation. Let me here reply to Catherine Fieschi’s major criticisms.
  • Cas Mudde, one of the major specialists on the subject, concedes that populism is a ‘thin-centred ideology’.
  • ...6 more annotations...
  • According to Michael Freeden’s ‘morphological analysis’, an ideology has its own ‘ineliminable’ core of values exercising control, with logically and culturally adjacent concepts that are further connected to peripheral concepts.
  • To point out that populism does not have the depth and sophistication of a political ideology is in no way an attempt to suggest that this is a ‘wishy-washy’ notion, even less to ‘to discourage analysts’, let alone ‘to bamboozle democrats’ as Catherine Fieschi alleges. No, it simply means testing the epistemological merits of the notion in order to reveal its heuristic limits.
  • In the 1930s, millions marched behind the banners of Fascism and Communism. Today, no one would die for a populist cause. Populism is no ideology simply because it offers no positive worldview. It is just a means to an end, a device to appeal to the masses.
  • Think for a moment: aren’t those amorphous policies of ‘mainstream’ parties responsible for their rising unpopularity and their decreasing credibility? Why should political scientists uncritically use the media clichés about ‘reasonable moderates’ opposing ‘undemocratic radicals/populists’?
  • It is a fact that populists thrive on ‘wounded’ democracies. But ‘wounded’ democracies are imperfectly run polities, where economic inequalities are dire, and where the elites have often broken their promises. Thus let’s not forget who provoked the ‘democratic fracture’ in the first place. Why do some political scientists seem oblivious to the fact that the ‘moderates’ who let down their electorates are mainly responsible for their own demise?
  • Again, the task of the political scientist should not be to condone or condemn this state of affairs, but to try to understand why people feel so disenfranchised. Consequently, the researcher should tackle and discuss the policies which make those populations suffer. Unfortunately, this is not something which most political scientists seem in the least concerned about. ‘Not to laugh, not to lament, not to detest, but to understand’ said Spinoza. Before looking down on the disoriented and angry voters who fall for the demagogues or dismissing all ‘radicals’ as undisputed ‘populists’, it would indeed be worth pausing for a moment to understand how those agents feel and to ask what they want. Political scientists should also wonder why more and more ‘moderate’ voters no longer believe in the enchanted world of ‘moderate politics’.
Levy Rivers

Mark Kleiman: Changing the topic - Politics on The Huffington Post - 0 views

  • Coincidentally, on the very same day the Financial Times reported that UBS had advised 50 current and former employees of its private banking group not to travel to the United States. The bank is worried that they might be arrested in connection with a massive tax-evasion scheme under which UBS helped rich Americans cheat the IRS, thus making sure that the rest of us suckers had to pay for, e.g., the War in Iraq. Some of the clients of the scheme are already testifying before a grand jury, and a senior UBS official has already been indicted. UBS is offering to provide lawyers for all of the suspects. Now, how is it that Gramm got to be Vice-Chairman of UBS? Why, by being the chief author of the banking-deregulation legislation (the repeal of the Glass-Steagall Act) that made so many bankers rich and helped create the crisis McCain doesn't want to do anything about. In keeping with McCain's decision to purge "lobbyists" from his campaign, Gramm had himself de-registered as a lobbyist. But he's still Vice Chairman of UBS, and still McCain's chief economic adviser. All the de-listing means is that he can't now personally call Congressmen or Senators; no doubt his staff can handle such details for the next few months.
Levy Rivers

Tom Watson MP » Blog Archive » Power of Information: New taskforce and speech - 0 views

  • We commissioned Ed Mayo and Tom Steinberg to write the Power of Information report because we knew that information, presented in the right way, was a potent driver for improving public services and government.
  • Today I am going to offer two arguments that I think compliment the Prime Minister’s recent announcement on public service reform
  • Firstly, that freeing up data will allow us to unlock the talent British entrepreneurs. And secondly, engaging people - using the simple tools that bring them together - will allow the talents of all our people to be applied to the provision of public services.
  • ...20 more annotations...
  • The difference of course is that today we contend with what Richard Saul Wurman describes as a ‘tsunami of data’
  • My job is to make sure that government can benefit from this new thinking too. When we were first elected in 1997 people had a recipient relationship with data, they got what they were given when they were given it. It was static.
  • In scale, the spread of social media is comparable to the spread of telephones in the 1930’s to the 1950’s. Yet it’s happened in two years not 20.
  • As Clay Shirky would say, we’ve reached a point where technology is simple and boring enough to be socially useful and interesting.
  • Over 7 million electronic signatures have been sent, electronically, to the Downing Street petition website. 1 in 10 citizens have emailed the Prime Minister about an issue. The next stage is to enable e-petitioners to connect with each other around particular issues and to link up with policy debates both on and off Government webspace.
  • Only last week, the Prime Minister became the first head of Government in Europe to launch his own channel on Twitter, which I can tell you from experience, is extremely useful to his ministers at least
  • Richard is here tonight and I hope that after the formal proceedings you might like to share some of your own ideas with him. Richard is also joined by a number of other taskforce members. They’re all people with remarkable track records in this field. We’re lucky. The UK has some of the world’s leading talent.
  • And today the PM announced an initiative that would allow you to find your community Bobbies using your postcode.
  • The taskforce will bring its expertise to bare on existing initiatives to see if we can what we already do better
  • I want the taskforce to ensure that the COI and Cabinet Office produce a set of guidelines that adheres to the letter of the law when it comes to the civil service code but also lives within the spirit of the age. I’ll be putting some very draft proposals to the taskforce to consider later this week.
  • By bringing people onto the taskforce with the skills and experiences of people like Sally Russell we can move further and faster in this area.
  • Two weeks ago the Prime Minister signalled that we were moving public services to the next stage of reform. He said that we were not only going to, further enhance choice but also empower both the users of services and all the professionals who deliver them - to drive up standards for all.
  • Transformational government is about wrapping services around the citizen, not citizens around the services.
  • Last month DirectGov had over 7 million visitors. Peter is seeing the aggregate desires of millions of UK public service using citizens. I had half an hour with him a fortnight ago and came away with a dozen ideas as to how we can improve our public services.
  • I’m the Member of Parliament for West Bromwich East and I didn’t know about an important recycling initiative going on in my own patch. This information now means that a bag load of clothing for a small child and a habitat sofa are about given a second chance to give pleasure.
  • And much of that information has the potential to be reused in data mashups. Some of it already is, like Hansard on theyworkforyou, or Google Maps using Ordnance Survey data.
  • The Power of Information Report recognised that, and made recommendations to the Treasury. The Treasury, with the Department for Business, Enterprise and Regulatory Reform, published an independent economic study in the Budget and announced its intention to look at these issues during this spending review cycle.
  • It was this early open source approach that arguably fostered 500 years of Islamic scholarship in important fields like medicine, astronomy, lexicography, literature and science. In contrast, European data was stored in monasteries and did not foster easy knowledge transfer. As Gibbon wrote in the ‘Decline and fall of the Roman empire’ the ‘age of Arabian learning continued about five hundred years’ and was coeval with the darkest and most slothful period of European annals?
  • I believe in the power of mass collaboration. I believe that as James Surowiecki says the many are smarter than the few. I believe that the old hierarchies in which government policy is made are going to change for ever. I said that I don’t believe the post-bureaucratic age argument. It’s just old thinking, laissez faire ideas with a new badge. The future of government is to provide tools for empowerment, not to sit back and hope that laissez-faire adhocracy will suffice.
  • The irony that laying claim to the ownership of a policy on open source was lost to the poor researcher who had spent a day dissecting the speech. He’d been able to do so easily because it was freely available on my blog, a simple tool used for communicating information quickly and at nearly zero cost without the requirement to charge for access. The point is, who cares? It doesn’t matter who has the ideas. It’s what you do with them and how you improve on them that counts.
Skeptical Debunker

Leaked intelligence documents: Here's what Facebook and Comcast will tell the police about you - Computerworld Blogs - 0 views

  • The "Facebook Subpoena/Search Warrant Guidelines" from the Cryptome site are dated 2008, so there's a chance they've been superseded. The document spells out how law enforcement and intelligence agenices should go about requesting information about Facebook users, and details what information is turned over. Following is what Facebook will turn over about you, taken verbatim from the guide: Types of Information Available User Neoprint The Neoprint is an expanded view of a given user profile. A request should specify that they are requesting a “Neoprint of used Id XXXXXX”. User Photoprint The Photoprint is a compilation of all photos uploaded by the user that have not been deleted, along with all photos uploaded by any user which have the requested user tagged in them. A request should specify that they are requesting a “Photoprint of user Id XXXXXX”. User Contact Info All user contact information input by the user and not subsequently deleted by the user is available, regardless of whether it is visible in their profile. This information may include the following: Name Birth date Contact e-mail address(s) Physical address City State Zip Phone Cell Work phone Screen name (usually for AOL Messenger/iChat) Website With the exception of contact e-mail and activated mobile numbers, Facebook validates none of this information. A request should specify that they are requesting "Contact information of user specified by [some other piece of contact information]". No historical data is retained. Group Contact Info Where a group is known, we will provide a list of users currently registered in a group. We will also provide a PDF of the current status of the group profile page. A request should specify that they are requesting "Contact information for group XXXXXX". No historical data is retained. IP Logs IP logs can be produced for a given user ID or IP address. A request should specify that they are requesting the "IP log of user Id XXXXXX" or "IP log of IP address xxx.xxx.xxx.xxx". The log contains the following information: * Script – script executed. For instance, a profile view of the URL http://www.facebook.com/profile.php?id=29445421 would populate script with "profile.php" * Scriptget – additional information passed to the script. In the above example, scriptget would contain "id=29445421" * Userid – The Facebook user id of the account active for the request * View time – date of execution in Pacific Time * IP – source IP address IP log data is generally retained for 90 days from present date. However, this data source is under active and major redevelopment and data may be retained for a longer or shorter period. Special Requests The Facebook Security Team may be able to retrieve specific information not addressed in the general categories above. Please contact Facebook if you have a specific investigative need prior to issuing a subpoena or warrant.
  • Comcast The Comcast document is labeled "Comcast Cable Law Enforcement Handbook," and is dated 2007, so there's a possibility that it, too, has been superseded. As with the other documents, it explains how law enforcement agenices can get information, and details what information is available. There's a great deal of detail in the 35-page document, which describes what Internet, phone, and television information will be turned over. For example, here's the IP information it will make available: Comcast currently maintains Internet Protocol address log files for a period of 180 days. If Comcast is asked to respond for information relating to an incident that occurred beyond this period, we will not have responsive information and can not fulfill a legal request. (Comcast can process and respond to preservation requests as outlined below in this Handbook.) As expected, Comcast will also turn over the emails, including attachments, of those who use Comcast's email service, but "In cases involving another entity’s email service or account, Comcast would not have any access to or ability to access customer email in response to a legal request." Information Comcast turns over to law enforcement agencies varies according to the request. For example, a grand jury subpoena will yield more information than a judicial summons, as you can see in the excerpt below. Comcast notes, though, that this is just a sample, and that "Each request is evaluated and reviewed on a case by case basis in light of any special procedural or legal requirements and applicable laws." So the examples "are for illustration only."
  • For those who worry about privacy, though, all of this information is small potatoes. The real worry is about the use of what are called pen registers or trap-and-trace devices, which essentially capture all of your Internet activity --- the Web sites you visits, the emails you send and receive, IM traffic, downloads, and so on. Here's what the document says about them: Pen Register / Trap and Trace Device Title 18 U.S.C. § 3123 provides a mechanism for authorizing and approving the installation and use of a pen register or a trap and trace device pursuant to court order. All orders must be coordinated prior to submission to Comcast. Law enforcement will be asked to agree to reimburse Comcast's reasonable costs incurred to purchase and/or install and monitor necessary equipment. See "Reimbursement," below.
  • ...2 more annotations...
  • As for your voice calls made via Comcast, here's what the company will turn over: Call Detail Records - Comcast maintains two years of historical call detail records (records of local and long distance connections) for our Comcast Digital Voice telephone service. This includes local, local toll, and long distance records. Comcast also currently provides traditional circuit-switched telephone service branded Comcast Digital Phone. Call detail records for this service are collected by AT&T and are available for approximately two years as well. To determine which type of service is involved, contact the Legal Demands Center—Voice and Video at 800-871-6298. Account Records - Account records are generally stored for approximately two years after the termination of an account. If the account has an outstanding balance due, records may be retained for a longer period of time. As with Internet information, what phone information will be turned over depends on the specific kind of legal request, and the examples "are for information only." Here's an excerpt:
  • And, as you would expect, there is the same pen register/trap-and-trace device language as in the section about the Internet. Oddly enough, it appears that when it comes to information about your television viewing habits, you have more privacy rights than you do when it comes to information about your Internet and voice use, because it can only be turned over in response to a court order, not a subpoena. Here's what the document has to say about TV information: Subscriber Account Identification and Related Records For subscribers to our cable television service, the Cable Act requires Comcast as a cable operator to disclose personally identifiable information to a governmental entity solely in response to a court order (and not, for example, a subpoena) or with the subscriber's express written consent. The Cable Act requires that the cable subscriber be afforded the opportunity to appear and contest in a court proceeding relevant to the court order any claims made in support of the court order. At the proceeding, the Cable Act requires the governmental entity to offer clear and convincing evidence that the subject of the information is reasonably suspected of engaging in criminal activity and that the information sought would be material evidence in the case. See 47 U.S.C. § 551(h). Why does the law give you more privacy protection over your television viewing habits than your Internet or phone use? I haven't a clue --- ask your congressman.
  •  
    Wonder what information Facebook and Comcast will turn over to police and intelligence agencies about you? Cryptome, the site that last week posted the leaked Microsoft "spy" manual, has posted company documents that purport to describe what those companies will reveal about you. As with the Microsoft document, the information is eye-opening.
Skeptical Debunker

Dezeen » Blog Archive » Porta Fira Towers by Toyo Ito and b720 Arquitectos - 0 views

  • The project consists of two towers that perform a subtle dialogue between them. The hotel (PB +25), is designed to turn on itself changing its perception as it is surrounded. Its skin is made of a system of red metal tubes placed with a certain inclination. This perception is complemented by the second tower, which will house offices (PB+22). A pure volume at the first sight, with a glass curtain wall, but the core of which also turns red on itself, becoming, in this way, a reflection of the hotel tower. Between the two towers, and connecting it, there is a common atrium.
  •  
    Japanese architect Toyo Ito and b720 Arquitectos of Spain have completed two adjacent towers in Barcelona containing a hotel and offices.
Skeptical Debunker

Unintended Consequences: Twelve Years under the DMCA | Electronic Frontier Foundation - 0 views

  • The DMCA Chills Free Expression and Scientific Research. Experience with section 1201 demonstrates that it is being used to stifle free speech and scientific research. The lawsuit against 2600 magazine, threats against Princeton Professor Edward Felten's team of researchers, and prosecution of Russian programmer Dmitry Sklyarov have chilled the legitimate activities of journalists, publishers, scientists, students, programmers, and members of the public. The DMCA Jeopardizes Fair Use. By banning all acts of circumvention, and all technologies and tools that can be used for circumvention, the DMCA grants to copyright owners the power to unilaterally eliminate the public's fair use rights. Already, the movie industry's use of encryption on DVDs has curtailed consumers' ability to make legitimate, personal-use copies of movies they have purchased. The DMCA Impedes Competition and Innovation. Rather than focusing on pirates, some have wielded the DMCA to hinder legitimate competitors. For example, the DMCA has been used to block aftermarket competition in laser printer toner cartridges, garage door openers, and computer maintenance services. Similarly, Apple has used the DMCA to tie its iPhone and iPod devices to Apple's own software and services. The DMCA Interferes with Computer Intrusion Laws. Further, the DMCA has been misused as a general-purpose prohibition on computer network access, a task for which it was not designed and to which it is ill-suited. For example, a disgruntled employer used the DMCA against a former contractor for simply connecting to the company's computer system through a virtual private network ("VPN").
  •  
    Since they were enacted in 1998, the "anti-circumvention" provisions of the Digital Millennium Copyright Act ("DMCA"), codified in section 1201 of the Copyright Act, have not been used as Congress envisioned. Congress meant to stop copyright infringers from defeating anti-piracy protections added to copyrighted works and to ban the "black box" devices intended for that purpose.1 In practice, the anti-circumvention provisions have been used to stifle a wide array of legitimate activities, rather than to stop copyright infringement. As a result, the DMCA has developed into a serious threat to several important public policy priorities:
Skeptical Debunker

Time for Democrats to take a risk - CNN.com - 0 views

  • Reconciliation was created through the Budget Reform Act of 1974 in an effort to streamline the budget process, strengthen the ability of Congress to make tough decisions regarding deficits, and to make legislative decision-making more efficient. Congress quickly expanded on the types of measures that could be considered under reconciliation until 1985 and 1986, when the Senate passed rules proposed by Sen. Robert Byrd that limited what could or could not be included when using this process. Before moving forward, Democrats must consider two questions. The first is whether using reconciliation to pass health care is legitimate or an abuse of the process. Republicans have charged that this would be akin to forcing the program through the chamber rather than passing the bill through negotiation and compromise. On this question, the answer is easy. Reconciliation has been as much a part of the Senate in the past three decades as the filibuster. According to an article that was published in The New Republic, Congress passed 22 reconciliation bills between 1980 and 2008. Many important policy changes were enacted through this process, including the Children's Health Insurance Program, COBRA (which allows people who switch jobs to keep their health care), student aid reform, expansions in Medicaid and several major tax cuts. NPR's Julie Rovner reported that most of the health care reforms enacted in the past two decades have gone through reconciliation. President Ronald Reagan was one of the first presidents to make aggressive use of reconciliation when he pushed through his economic program in 1981. Senate Majority Leader Howard Baker said then that speed had been essential because "Every day that this is delayed makes it more difficult to pass. This is an extraordinary proposal, and these are extraordinary times." Presidents Jimmy Carter, George H.W. Bush, Bill Clinton and George W. Bush all used reconciliation as well. It is worth noting that these presidents, particularly George W. Bush, also made use of sweeping executive power to circumvent Congress altogether. The second question is more difficult and it involves perceptions. If the Democratic leadership wants to use this tactic, they have to convince enough members of their own party that this won't scare off independent voters. This argument was harder to make in 2009 than in 2010. But after a year of dealing with paralysis in the Senate and highly effective Republican obstruction, more Democrats are coming on board. The leadership must be proactive in responding to the criticism about reconciliation. They will have to explain that reconciliation is a legitimate process by pointing to the history. They will also have to connect the dots for voters frustrated with the ineffective government by explaining that the constant use of the filibuster has turned the Senate into a supermajority institution where both parties have found it extraordinarily difficult -- virtually impossible -- to pass major legislation.On this point, Republicans and Democrats actually agree. Indeed, as Democrats make this decision, Kentucky Republican Senator Jim Bunning is objecting to a unanimous consent order and single-handedly preventing the Senate from passing an important bill to assist unemployed workers.
  •  
    After the Republicans and Democrats met at the White House summit on health care, it was clear that the parties are very far away from a bipartisan agreement. Indeed, few participants walked away with the sense that they were any closer to a deal. The White House did make clear that it was willing to move forward on health care without Republican support. The choice now becomes whether Democrats should use the budget reconciliation process to pass some parts of health care legislation. According to recent reports, Democrats are considering having the House pass the bill that was already approved in the Senate and then dealing with a package of additional reforms through reconciliation.
  •  
    Get that? The current "god" of conservatism - Ronald Reagan - used reconciliation aggressively. So if it was good enough for him ...
Anna Molly

America's Ten Most Corrupt Capitalists | Economy | AlterNet - 1 views

  • Federal Reserve chairman backed all of Rubin's favorite deregulatory plans,
  • crush an effort by Brooksley Born to regulate derivatives in 1998
  • Greenspan went to bat for politically connected Savings & Loan titan Charles Keating
‹ Previous 21 - 30 of 30
Showing 20 items per page