I essentially question the
epistemological flaws surrounding the uses of the notion: when is it safe to call
a politician, a political party or movement ‘populist’?
Group items matching
in title, tags, annotations or urlArmed Chinese Troops in Texas! - YouTube - 0 views
-
NOTE: It is important to separate hunting down terrorists who attack our country and deserve justice (which Ron Paul is 100% for), and not confuse justice with occupying entire countries for a decade under the guise of the "War on Terror" or "Spreading Democracy". Terrorists are individuals and small groups, so why are we picking fights with entire nations? BILLIONS for Defense, NOT A PENNY for Empire. This speech is called "Imagine" and it was given by Ron Paul on March 11, 2009. The original text of the talk is below: Imagine for a moment that somewhere in the middle of Texas there was a large foreign military base, say Chinese or Russian. Imagine that thousands of armed foreign troops were constantly patrolling American streets in military vehicles. Imagine they were here under the auspices of "keeping us safe" or "promoting democracy" or "protecting their strategic interests." Imagine that they operated outside of US law, and that the Constitution did not apply to them. Imagine that every now and then they made mistakes or acted on bad information and accidentally killed or terrorized innocent Americans, including women and children, most of the time with little to no repercussions or consequences. Imagine that they set up checkpoints on our soil and routinely searched and ransacked entire neighborhoods of homes. Imagine if Americans were fearful of these foreign troops, and overwhelmingly thought America would be better off without their presence. Imagine if some Americans were so angry about them being in Texas that they actually joined together to fight them off, in defense of our soil and sovereignty, because leadership in government refused or were unable to do so. Imagine that those Americans were labeled terrorists or insurgents for their defensive actions, and routinely killed, or captured and tortured by the foreign troops on our land. Imagine that the occupiers' attitude was that if they just killed enough Americans, the resistance would stop, but inst
Bill Keller's self-defense on "torture" - Glenn Greenwald - Salon.com - 0 views
-
In response to the Harvard study documenting how newspapers labeled waterboarding as "torture" for almost 100 years until the Bush administration told them not to, The New York Times issued a statement justifying this behavior on the ground that it did not want to take sides in the debate. Andrew Sullivan, Greg Sargent and Adam Serwer all pointed out that "taking a side" is precisely what the NYT did: by dutifully complying with the Bush script and ceasing to use the term (replacing it with cleansing euphemisms), it endorsed the demonstrably false proposition that waterboarding was something other than torture. Yesterday, the NYT's own Brian Stelter examined this controversy and included a justifying quote from the paper's Executive Editor, Bill Keller, that is one of the more demented and reprehensible statements I've seen from a high-level media executive in some time (h/t Jay Rosen):
YouTube - Ralph Nader: 1/13 An Unreasonable Man Subt Español - 0 views
-
In 1966, General Motors, the most powerful corporation in the world, sent private investigators to dig up dirt on an obscure thirty-two year old public interest lawyer named Ralph Nader, who had written a book critical of one of their cars, the Corvair. The scandal that ensued after the smear campaign was revealed launched Ralph Nader into national prominence and established him as one of the most admired Americans and the leader of the modern Consumer Movement. Over the next thirty years and without ever holding public office, Nader built a legislative record that is the rival of any contemporary president. Many things we take for granted including seat belts, airbags, product labeling, no nukes, even the free ticket you get after being bumped from an overbooked flight are largely due to the efforts of Ralph Nader and his citizen groups. Yet today, when most people hear the name "Ralph Nader," they think of the man who gave the country George W. Bush. As a result, after sustaining his popularity and effectiveness over an unprecedented amount of time, he has become a pariah even among former friends and allies. How did this happen? Is he really to blame for George W. Bush? Who has stuck by him and who has abandoned him? Has our democracy become a consumer fraud? After being so right for so many years, how did he seem to go so wrong? With the help of exciting graphics, rare archival footage and over forty on-camera interviews conducted over the past two years, "An Unreasonable Man" traces the life and career of Ralph Nader, one of the most unique, important, and controversial political figures of the past half century.
Populism and the enchanted world of 'moderate politics' | openDemocracy - 1 views
-
-
The stakes are high because to label someone as ‘populist’ is to imply that s/he is somehow a potential or real enemy of representative democracy. My critic refers to the ‘pernicious effects’ of populism which underlines the notion’s very negative connotation. Let me here reply to Catherine Fieschi’s major criticisms.
-
Cas Mudde, one of the major specialists on the subject, concedes that populism is a ‘thin-centred ideology’.
- ...6 more annotations...
Why India is still developing? - 0 views
http://avi-mypercept.blogspot.co.uk/search/label/hereditary%20politics
FiveThirtyEight.com: Electoral Projections Done Right: The Persistent Myth of the Bradley Effect - 0 views
-
A fairly typical example comes in the form of a blind quote from a Democratic strategist this morning at The Politico:A huge challenge for Obama, insiders say, is simply determining how much skin color will matter in November. Race is nearly impossible to poll – no one ever says “I’m a racist” – and no campaign wants it revealed they are even asking questions on the issue.
-
As we have described here before, polling numbers from the primaries suggested no presence of a Bradley Effect. On the contrary, it was Barack Obama -- not Hillary Clinton -- who somewhat outperformed his polls on Election Day.
-
This effect appears to be most substantial in states with larger black populations; I have suggested before that it might stem from a sort of reverse Bradley Effect in which black voters were reluctant to disclose to a (presumed) white interviewer that they were about to vote for a black candidate.
- ...1 more annotation...
Belief In Climate Change Hinges On Worldview : NPR - 0 views
-
-
"People tend to conform their factual beliefs to ones that are consistent with their cultural outlook, their world view," Braman says. The Cultural Cognition Project has conducted several experiments to back that up. Participants in these experiments are asked to describe their cultural beliefs. Some embrace new technology, authority and free enterprise. They are labeled the "individualistic" group. Others are suspicious of authority or of commerce and industry. Braman calls them "communitarians." In one experiment, Braman queried these subjects about something unfamiliar to them: nanotechnology — new research into tiny, molecule-sized objects that could lead to novel products. "These two groups start to polarize as soon as you start to describe some of the potential benefits and harms," Braman says. The individualists tended to like nanotechnology. The communitarians generally viewed it as dangerous. Both groups made their decisions based on the same information. "It doesn't matter whether you show them negative or positive information, they reject the information that is contrary to what they would like to believe, and they glom onto the positive information," Braman says.
-
"Basically the reason that people react in a close-minded way to information is that the implications of it threaten their values," says Dan Kahan, a law professor at Yale University and a member of The Cultural Cognition Project. Kahan says people test new information against their preexisting view of how the world should work. "If the implication, the outcome, can affirm your values, you think about it in a much more open-minded way," he says. And if the information doesn't, you tend to reject it. In another experiment, people read a United Nations study about the dangers of global warming. Then the researchers told the participants that the solution to global warming is to regulate industrial pollution. Many in the individualistic group then rejected the climate science. But when more nuclear power was offered as the solution, says Braman, "they said, you know, it turns out global warming is a serious problem."And for the communitarians, climate danger seemed less serious if the only solution was more nuclear power.
- ...1 more annotation...
-
"It's a hoax," said coal company CEO Don Blankenship, "because clearly anyone that says that they know what the temperature of the Earth is going to be in 2020 or 2030 needs to be put in an asylum because they don't." On the other side of the debate was environmentalist Robert Kennedy, Jr. "Ninety-eight percent of the research climatologists in the world say that global warming is real, that its impacts are going to be catastrophic," he argued. "There are 2 percent who disagree with that. I have a choice of believing the 98 percent or the 2 percent." To social scientist and lawyer Don Braman, it's not surprising that two people can disagree so strongly over science. Braman is on the faculty at George Washington University and part of The Cultural Cognition Project, a group of scholars who study how cultural values shape public perceptions and policy
Leaked intelligence documents: Here's what Facebook and Comcast will tell the police about you - Computerworld Blogs - 0 views
-
The "Facebook Subpoena/Search Warrant Guidelines" from the Cryptome site are dated 2008, so there's a chance they've been superseded. The document spells out how law enforcement and intelligence agenices should go about requesting information about Facebook users, and details what information is turned over. Following is what Facebook will turn over about you, taken verbatim from the guide: Types of Information Available User Neoprint The Neoprint is an expanded view of a given user profile. A request should specify that they are requesting a “Neoprint of used Id XXXXXX”. User Photoprint The Photoprint is a compilation of all photos uploaded by the user that have not been deleted, along with all photos uploaded by any user which have the requested user tagged in them. A request should specify that they are requesting a “Photoprint of user Id XXXXXX”. User Contact Info All user contact information input by the user and not subsequently deleted by the user is available, regardless of whether it is visible in their profile. This information may include the following: Name Birth date Contact e-mail address(s) Physical address City State Zip Phone Cell Work phone Screen name (usually for AOL Messenger/iChat) Website With the exception of contact e-mail and activated mobile numbers, Facebook validates none of this information. A request should specify that they are requesting "Contact information of user specified by [some other piece of contact information]". No historical data is retained. Group Contact Info Where a group is known, we will provide a list of users currently registered in a group. We will also provide a PDF of the current status of the group profile page. A request should specify that they are requesting "Contact information for group XXXXXX". No historical data is retained. IP Logs IP logs can be produced for a given user ID or IP address. A request should specify that they are requesting the "IP log of user Id XXXXXX" or "IP log of IP address xxx.xxx.xxx.xxx". The log contains the following information: * Script – script executed. For instance, a profile view of the URL http://www.facebook.com/profile.php?id=29445421 would populate script with "profile.php" * Scriptget – additional information passed to the script. In the above example, scriptget would contain "id=29445421" * Userid – The Facebook user id of the account active for the request * View time – date of execution in Pacific Time * IP – source IP address IP log data is generally retained for 90 days from present date. However, this data source is under active and major redevelopment and data may be retained for a longer or shorter period. Special Requests The Facebook Security Team may be able to retrieve specific information not addressed in the general categories above. Please contact Facebook if you have a specific investigative need prior to issuing a subpoena or warrant.
-
Comcast The Comcast document is labeled "Comcast Cable Law Enforcement Handbook," and is dated 2007, so there's a possibility that it, too, has been superseded. As with the other documents, it explains how law enforcement agenices can get information, and details what information is available. There's a great deal of detail in the 35-page document, which describes what Internet, phone, and television information will be turned over. For example, here's the IP information it will make available: Comcast currently maintains Internet Protocol address log files for a period of 180 days. If Comcast is asked to respond for information relating to an incident that occurred beyond this period, we will not have responsive information and can not fulfill a legal request. (Comcast can process and respond to preservation requests as outlined below in this Handbook.) As expected, Comcast will also turn over the emails, including attachments, of those who use Comcast's email service, but "In cases involving another entity’s email service or account, Comcast would not have any access to or ability to access customer email in response to a legal request." Information Comcast turns over to law enforcement agencies varies according to the request. For example, a grand jury subpoena will yield more information than a judicial summons, as you can see in the excerpt below. Comcast notes, though, that this is just a sample, and that "Each request is evaluated and reviewed on a case by case basis in light of any special procedural or legal requirements and applicable laws." So the examples "are for illustration only."
-
For those who worry about privacy, though, all of this information is small potatoes. The real worry is about the use of what are called pen registers or trap-and-trace devices, which essentially capture all of your Internet activity --- the Web sites you visits, the emails you send and receive, IM traffic, downloads, and so on. Here's what the document says about them: Pen Register / Trap and Trace Device Title 18 U.S.C. § 3123 provides a mechanism for authorizing and approving the installation and use of a pen register or a trap and trace device pursuant to court order. All orders must be coordinated prior to submission to Comcast. Law enforcement will be asked to agree to reimburse Comcast's reasonable costs incurred to purchase and/or install and monitor necessary equipment. See "Reimbursement," below.
- ...2 more annotations...
-
Wonder what information Facebook and Comcast will turn over to police and intelligence agencies about you? Cryptome, the site that last week posted the leaked Microsoft "spy" manual, has posted company documents that purport to describe what those companies will reveal about you. As with the Microsoft document, the information is eye-opening.
1 - 9 of 9
Showing 20▼ items per page