Skip to main content

Home/ Politically Minded/ Group items matching "leaked" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Skeptical Debunker

Leaked documents: UK record industry wrote web-censorship amendment - Boing Boing - 0 views

  • Parliamentarians need to recognize that copyright touches everyone and every technology in the digital age. It is no longer a question of inter-business regulation and deals. Getting copyright wrong has the potential to mess up our freedom of speech, prevent us from getting the benefits of new technologies, and damage society in other very profound ways. It is therefore deeply inappropriate for such fundamental proposals to have been introduced by both the government or the opposition parties at the behest of one side of the debate. That applies just as much to disconnection, which Mandelson introduced in the summer at the last minute under pressure again from the BPI and other rights holders.
  •  
    Last week, the UK LibDem party was thrown into scandal when two of its Lords proposed an amendment to the Digital Economy Bill that would allow for national web-censorship, particularly aimed at "web-lockers" like Google Docs and YouSendIt. Now a leaked document from the British Phonographic Institute suggests that the amendment was basically written by the record industry lobby and entered into law on their behalf by representatives of the "party of liberty." This weekend, LibDem members who attend the national convention in Birmingham will have the chance to vote on an emergency measure affirming the party's commitment to an open and just Internet, repudiating this disastrous measure. If you (or someone you know) is attending the convention, please support the "Save the Net" emergency measure and help rehabilitate the party's reputation on fundamental freedoms in the information society.
  •  
    Proving once again that special interests can "buy" the "support" of politicians of any stripe! And they can do so regardless of the "best interests" of the "majority of the people", who those politicians are supposedly morally (by honor) and legally (by oath) bound to represent!
thinkahol *

Newly leaked documents show the ongoing travesty of Guantanamo - Glenn Greenwald - Salon.com - 0 views

  •  
    Numerous media outlets -- The New York Times, The Washington Post, The Guardian, The Telegraph, and NPR, among others - last night published classified files on more than 700 past and present Guantanamo detainees. The leak was originally provided to WikiLeaks, which then gave them to the Post, NPR and others; the NYT and The Guardian claim to have received them from "another source" (WikiLeaks suggested the "other source" was Daniel Domscheit-Berg, a former WikiLeaks associate who WikiLeaks claims took, without authorization, many WikiLeaks files when he left). The documents reveal vast new information about these detainees and, in particular, the shoddy and unreliable nature of the "evidence" used (both before and now) to justify their due-process-free detentions. There are several points worth noting about all this:
thinkahol *

Leaked Statements on IAEA Claim Iran Has Covert Nuclear Weapons Program -- News from Antiwar.com - 0 views

  •  
    The US and Israel have been pressuring Iran towards attaining a nuclear deterrent, while ignoring opportunities to deescalate
Skeptical Debunker

Leaked intelligence documents: Here's what Facebook and Comcast will tell the police about you - Computerworld Blogs - 0 views

  • The "Facebook Subpoena/Search Warrant Guidelines" from the Cryptome site are dated 2008, so there's a chance they've been superseded. The document spells out how law enforcement and intelligence agenices should go about requesting information about Facebook users, and details what information is turned over. Following is what Facebook will turn over about you, taken verbatim from the guide: Types of Information Available User Neoprint The Neoprint is an expanded view of a given user profile. A request should specify that they are requesting a “Neoprint of used Id XXXXXX”. User Photoprint The Photoprint is a compilation of all photos uploaded by the user that have not been deleted, along with all photos uploaded by any user which have the requested user tagged in them. A request should specify that they are requesting a “Photoprint of user Id XXXXXX”. User Contact Info All user contact information input by the user and not subsequently deleted by the user is available, regardless of whether it is visible in their profile. This information may include the following: Name Birth date Contact e-mail address(s) Physical address City State Zip Phone Cell Work phone Screen name (usually for AOL Messenger/iChat) Website With the exception of contact e-mail and activated mobile numbers, Facebook validates none of this information. A request should specify that they are requesting "Contact information of user specified by [some other piece of contact information]". No historical data is retained. Group Contact Info Where a group is known, we will provide a list of users currently registered in a group. We will also provide a PDF of the current status of the group profile page. A request should specify that they are requesting "Contact information for group XXXXXX". No historical data is retained. IP Logs IP logs can be produced for a given user ID or IP address. A request should specify that they are requesting the "IP log of user Id XXXXXX" or "IP log of IP address xxx.xxx.xxx.xxx". The log contains the following information: * Script – script executed. For instance, a profile view of the URL http://www.facebook.com/profile.php?id=29445421 would populate script with "profile.php" * Scriptget – additional information passed to the script. In the above example, scriptget would contain "id=29445421" * Userid – The Facebook user id of the account active for the request * View time – date of execution in Pacific Time * IP – source IP address IP log data is generally retained for 90 days from present date. However, this data source is under active and major redevelopment and data may be retained for a longer or shorter period. Special Requests The Facebook Security Team may be able to retrieve specific information not addressed in the general categories above. Please contact Facebook if you have a specific investigative need prior to issuing a subpoena or warrant.
  • Comcast The Comcast document is labeled "Comcast Cable Law Enforcement Handbook," and is dated 2007, so there's a possibility that it, too, has been superseded. As with the other documents, it explains how law enforcement agenices can get information, and details what information is available. There's a great deal of detail in the 35-page document, which describes what Internet, phone, and television information will be turned over. For example, here's the IP information it will make available: Comcast currently maintains Internet Protocol address log files for a period of 180 days. If Comcast is asked to respond for information relating to an incident that occurred beyond this period, we will not have responsive information and can not fulfill a legal request. (Comcast can process and respond to preservation requests as outlined below in this Handbook.) As expected, Comcast will also turn over the emails, including attachments, of those who use Comcast's email service, but "In cases involving another entity’s email service or account, Comcast would not have any access to or ability to access customer email in response to a legal request." Information Comcast turns over to law enforcement agencies varies according to the request. For example, a grand jury subpoena will yield more information than a judicial summons, as you can see in the excerpt below. Comcast notes, though, that this is just a sample, and that "Each request is evaluated and reviewed on a case by case basis in light of any special procedural or legal requirements and applicable laws." So the examples "are for illustration only."
  • For those who worry about privacy, though, all of this information is small potatoes. The real worry is about the use of what are called pen registers or trap-and-trace devices, which essentially capture all of your Internet activity --- the Web sites you visits, the emails you send and receive, IM traffic, downloads, and so on. Here's what the document says about them: Pen Register / Trap and Trace Device Title 18 U.S.C. § 3123 provides a mechanism for authorizing and approving the installation and use of a pen register or a trap and trace device pursuant to court order. All orders must be coordinated prior to submission to Comcast. Law enforcement will be asked to agree to reimburse Comcast's reasonable costs incurred to purchase and/or install and monitor necessary equipment. See "Reimbursement," below.
  • ...2 more annotations...
  • As for your voice calls made via Comcast, here's what the company will turn over: Call Detail Records - Comcast maintains two years of historical call detail records (records of local and long distance connections) for our Comcast Digital Voice telephone service. This includes local, local toll, and long distance records. Comcast also currently provides traditional circuit-switched telephone service branded Comcast Digital Phone. Call detail records for this service are collected by AT&T and are available for approximately two years as well. To determine which type of service is involved, contact the Legal Demands Center—Voice and Video at 800-871-6298. Account Records - Account records are generally stored for approximately two years after the termination of an account. If the account has an outstanding balance due, records may be retained for a longer period of time. As with Internet information, what phone information will be turned over depends on the specific kind of legal request, and the examples "are for information only." Here's an excerpt:
  • And, as you would expect, there is the same pen register/trap-and-trace device language as in the section about the Internet. Oddly enough, it appears that when it comes to information about your television viewing habits, you have more privacy rights than you do when it comes to information about your Internet and voice use, because it can only be turned over in response to a court order, not a subpoena. Here's what the document has to say about TV information: Subscriber Account Identification and Related Records For subscribers to our cable television service, the Cable Act requires Comcast as a cable operator to disclose personally identifiable information to a governmental entity solely in response to a court order (and not, for example, a subpoena) or with the subscriber's express written consent. The Cable Act requires that the cable subscriber be afforded the opportunity to appear and contest in a court proceeding relevant to the court order any claims made in support of the court order. At the proceeding, the Cable Act requires the governmental entity to offer clear and convincing evidence that the subject of the information is reasonably suspected of engaging in criminal activity and that the information sought would be material evidence in the case. See 47 U.S.C. § 551(h). Why does the law give you more privacy protection over your television viewing habits than your Internet or phone use? I haven't a clue --- ask your congressman.
  •  
    Wonder what information Facebook and Comcast will turn over to police and intelligence agencies about you? Cryptome, the site that last week posted the leaked Microsoft "spy" manual, has posted company documents that purport to describe what those companies will reveal about you. As with the Microsoft document, the information is eye-opening.
Muslim Academy

Work and Faith Relationship in Islam - 0 views

  •  
    In our current hyper-productive, "time-is-money" motivated community, the idea of a "9 to 5″ working hours doesn't really are available any longer. The time spent at work, whether at the office or any other place, often competing the time spent targeted on anything else in our lifestyle. With the convenience of technology, work has crept into the sides of our everyday living and essentially obliterated the stability between the public and private dichotomies that were once clearly separated. From Islamic Point of View As Muslims, the fact that Islam is a way of lifestyle and not just a perception, punches an even greater wrench into the frustrating complexness of keeping personal perception levels and discussing work circumstances. From arranged wishes and guidelines of modesty, to a month of going on a fast and limited sex connections, God-consciousness prevails in all that a exercising Islamic does. So, when work seems to leak over into lifestyle and individuals are frustrated from providing perception into the office, how does a Islamic reunite the requirements of the office without limiting his or her faith?
thinkahol *

With Rumored Manhunt for Wikileaks Founder and Arrest of Alleged Leaker of Video Showing Iraq Killings, Obama Admin Escalates Crackdown on Whistleblowers of Classified Information - 0 views

  •  
    Pentagon investigators are reportedly still searching for Wikileaks co-founder Julian Assange, who helped release a classified US military video showing a US helicopter gunship indiscriminately firing on Iraqi civilians. The US military recently arrested Army Specialist Bradley Manning, who may have passed on the video to Wikileaks. Manning's arrest and the hunt for Assange have put the spotlight on the Obama administration's campaign against whistleblowers and leakers of classified information. We speak to Daniel Ellsberg, who's leaking of the Pentagon Papers has made him perhaps the nation's most famous whistleblower; Birgitta Jónsdóttir, a member of the Icelandic Parliament who has collaborated with Wikileaks and drafted a new Icelandic law protecting investigative journalists; and Glenn Greenwald, political and legal blogger for Salon.com. [includes rush transcript]
thinkahol *

How propaganda is disseminated: WikiLeaks Edition - Glenn Greenwald - Salon.com - 0 views

  •  
    On the eve of a new leak, widely trumpeted Pentagon accusations about the whistleblowing site have proven false
thinkahol *

Iraq war leaks: No U.S. investigation of many abuses - All Salon - Salon.com - 0 views

  •  
    WikiLeaks report suggests U.S. failed to investigate evidence that Iraqi forces tortured, killed captives
thinkahol *

YouTube - Iraq Vet: "WikiLeaks tells the truth" - 0 views

  •  
    The largest intel leak in the United States history, has been the most revealing account of any war in history. Over 400,000 classified US military documents on the Iraq war were released by the whistle blowing website WikiLeaks and its founder Julian Assange. Iraq war veteran Josh Steiber says that
thinkahol *

Amy Goodman: WikiLeaks and the End of U.S. 'Diplomacy' - Truthdig - 0 views

  •  
    WikiLeaks is again publishing a trove of documents, in this case classified U.S. State Department diplomatic cables. The whistle-blower website will gradually be releasing more than 250,000 of these documents in the coming months so that they can be analyzed and gain the attention they deserve. The cables are internal, written communications among U.S. embassies around the world and also to the U.S. State Department. WikiLeaks described the leak as "the largest set of confidential documents ever to be released into the public domain [giving] an unprecedented insight into U.S. government foreign activities."
Levy Rivers

Obama the Delegator Picks When to Take Reins - NYTimes.com - 0 views

  • He does not stir dissent simply for dissent’s sake, but often employs a Socratic method of discussion, where aides put ideas forward for him to accept or reject. Advisers described his meetings as “un-Clintonesque,” a reference to the often meandering, if engrossing, policy discussions Bill Clinton presided over when he was president.
  • But Mr. Obama’s ease belies a more controlling management style. For all the success his campaign has enjoyed with grass-roots organizing, the operation is highly centralized around Mr. Axelrod; David Plouffe, the campaign manager; Robert Gibbs, the communications director; Pete Rouse, his Senate chief of staff; Valerie Jarrett, a longtime friend from Chicago; and a handful of senior advisers that has barely changed since he opened his campaign in January 2007.
  • Mr. Obama’s circle of advisers takes seriously his “no drama” mandate. It is a point of pride in his campaign that there have been virtually no serious leaks to the news media — small leaks are immediately investigated — about internal division or infighting. He is a careful reader of daily newspapers and magazines (titles from Foreign Affairs to Maxim are stocked on his campaign plane). He takes his briefing books — three-ring binders filled with political memorandums and policy discussions — to his hotel room or home every night, but aides say how well he reads the materials may depend on what is on ESPN.
  • ...1 more annotation...
  • “He’ll say, ‘that is not my voice,’ ” said Jim Margolis, a senior media consultant to Mr. Obama who oversees television advertising. “Definitely this isn’t somebody you just throw the script to and he’ll say anything that comes up on the screen. He tries to make sure that he’s got his imprint on it.”
thinkahol *

Weekly Review-By Anthony Lydgate (Harper's Magazine) - 0 views

  •  
    After eating a bowl of oatmeal and drafting ten talking points, Senator Bernie Sanders (Ind., Vt.) spoke for nine hours in opposition to the tax-cut deal struck between President Obama and congressional Republicans. "We should be embarrassed," he said, "that we are for one second talking about a proposal that gives tax breaks to billionaires while we are ignoring the needs of working families, low-income people and the middle class."1 2 3 Mark Madoff, son of Bernard L. Madoff, hanged himself in his Manhattan apartment while his toddler slept in a nearby bedroom; court documents filed last year suggest that Mark Madoff made almost $67 million through his father's Ponzi scheme.4 WikiLeaks founder Julian Assange was arrested in London on charges of sexual assault. "That sounds like good news to me," said U.S. Defense Secretary Robert Gates.5 State Department cables leaked this week revealed that Saudi media executives, over coffee in a Jeddah Starbucks, extolled the power of American television in the fight against Islamic extremism, while Saudi diplomats expressed their admiration for the movies Insomnia and Michael Clayton.6 Taymour Abdelwahab, a Swedish citizen, set off a car bomb and then blew himself up in Stockholm on Saturday, injuring two in what authorities believe was a botched attempt at a larger attack, and imprisoned Chinese dissident Liu Xiaobo was awarded the Nobel Peace Prize. Online discussion of the chair symbolizing his absence from the ceremony in Oslo prompted authorities in China to censor the phrases "empty chair," "empty seat," "empty stool" and "empty table" from the country's major social networking sites.7 8 9
thinkahol *

WikiLeaks - 0 views

shared by thinkahol * on 05 Jan 11 - Cached
  •  
    WikiLeaks is a non-profit media organization dedicated to bringing important news and information to the public. We provide an innovative, secure and anonymous way for independent sources around the world to leak information to our journalists. We publish material of ethical, political and historical significance while keeping the identity of our sources anonymous, thus providing a universal way for the revealing of suppressed and censored injustices.
thinkahol *

The leaked campaign to attack WikiLeaks and its supporters - Glenn Greenwald - Salon.com - 0 views

  •  
    A proposal to help Bank of America destroy the group and its advocates reveal a deeply lawless mindset
thinkahol *

U.S. Chamber To Rank Politicians On Whether They Vote To Keep Contractor Donations Secret | TPMMuckraker - 0 views

  •  
    The U.S. Chamber of Commerce has written a letter to members of the House telling them that voting for federal contractors to be more transparent about their political spending will negatively impact their legislative scorecard. "The U.S. Chamber of Commerce strongly supports legislative proposals to ensure that political spending -- or the lack thereof -- continues to play no role in federal contracting decisions," the Chamber's R. Bruce Josten wrote in the letter sent on Wednesday. "Therefore, the Chamber supports amendments that have been offered by Rep. Cole to several Fiscal Year 2012 appropriations bills considered by the full House, and any similar amendments should they be offered to the remaining FY 2012 appropriations bills," he wrote. Meanwhile, more than sixty members of the House signed a letter sent to the White House by Rep. Anna G. Eshoo (D-CA) which expressed strong support for a draft executive order which would require companies that get taxpayer dollars to disclose their political expenditures. Disclosure, the letter says, "will not politicize the procurement process -- it will improve it." "Political expenditures are already well-known to those that make them and to the officials who benefit," the letter states. "With disclosure, the public will have access to this information as well, allowing them to judge whether contracts were awarded based on merit. A meritorious procurement system is the only responsible use of taxpayer money, making this a deficit reduction effort as much as a campaign finance reform issue." Both the Chamber and House Republicans have argued that the proposed executive order -- first leaked in April -- is a plot by the Obama administration to silence political opponents. Supporters of the measure have said the executive order -- by bringing donations out into the open -- would actually discourage federal contracting officials from doing favors for contractors based on their donations to third-party political groups
1 - 20 of 25 Next ›
Showing 20 items per page