Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Diigo-Issues

Rss Feed Group items tagged

Gary Edwards

Jim Kunstler's 2014 Forecast - Burning Down The House | Zero Hedge - 0 views

  •  
    Incredible must read analysis. Take away: the world is going to go "medevil". It's the only way out of this mess. Since the zero hedge layout is so bad, i'm going to post as much of the article as Diigo will allow: Jim Kunstler's 2014 Forecast - Burning Down The House Submitted by Tyler Durden on 01/06/2014 19:36 -0500 Submitted by James H. Kunstler of Kunstler.com , Many of us in the Long Emergency crowd and like-minded brother-and-sisterhoods remain perplexed by the amazing stasis in our national life, despite the gathering tsunami of forces arrayed to rock our economy, our culture, and our politics. Nothing has yielded to these forces already in motion, so far. Nothing changes, nothing gives, yet. It's like being buried alive in Jell-O. It's embarrassing to appear so out-of-tune with the consensus, but we persevere like good soldiers in a just war. Paper and digital markets levitate, central banks pull out all the stops of their magical reality-tweaking machine to manipulate everything, accounting fraud pervades public and private enterprise, everything is mis-priced, all official statistics are lies of one kind or another, the regulating authorities sit on their hands, lost in raptures of online pornography (or dreams of future employment at Goldman Sachs), the news media sprinkles wishful-thinking propaganda about a mythical "recovery" and the "shale gas miracle" on a credulous public desperate to believe, the routine swindles of medicine get more cruel and blatant each month, a tiny cohort of financial vampire squids suck in all the nominal wealth of society, and everybody else is left whirling down the drain of posterity in a vortex of diminishing returns and scuttled expectations. Life in the USA is like living in a broken-down, cob-jobbed, vermin-infested house that needs to be gutted, disinfected, and rebuilt - with the hope that it might come out of the restoration process retaining the better qualities of our heritage.
Gary Edwards

Google Reader - "Banksters" public tag collection - 1 views

  •  
    Google Reader is my primary tool for browsing news, articles and blogs.  This is a public page (with Atom RSS) to all gReader items tagged "Bankster".  Wish i could push my gBookmarks into Diigo, or, tag my gReader items with a Diigo Group/List/Comment.  Sadly though, it is increasingly hard for me to keep up my Diigo Groups when all the items bookmarked first show up in Google Reader!  Anyway, this public page is an experiment to get around the gap between gReader and Diigo.  A gap growing by the day.
Paul Merrell

DOJ Seeks Removal Of Restrictions On Computer Search Warrants - 0 views

  • The Justice Department recently submitted proposed new rules on the procedures and practices of the department’s agencies and bureaus. Among the suggested changes is a modification of the Federal Rules of Criminal Procedure Rule 41(b), which empowers a federal court to issue a warrant allowing the federal government to conduct a search of a computer or computer network involved in a criminal investigation. Under current regulations, a warrant issued by a federal court is only valid in that court’s district. As there are 94 federal judicial districts, investigating a widespread attack may require either petitioning dozens of district courts or acting extrajudicially by not seeking a warrant. An extrajudicial investigation, however, cannot be used if criminal convictions are sought, as evidence gathered in this manner is not typically admissible in court. The Justice Department is seeking to make remote access warrants to search, seize and copy electronic information valid for all federal districts.
  • The Justice Department argues that due to the sophistication of cyber-criminals, an offending computer or computer cluster can sit in a district separate from the district where the hackers that infected the target computer anonymously are and separate from the investigators’ district. “Criminals are using multiple computers in many districts simultaneously as part of complex criminal schemes, and effectively investigating and disrupting these schemes often requires remote access to Internet-connected computers in many different districts,” wrote then-acting Assistant Attorney General Mythili Raman in a September letter to the Advisory Committee on the Criminal Rules. “Botnets are a significant threat to the public: they are used to conduct large-scale denial of service attacks, steal personal and financial data, and distribute malware designed to invade the privacy of users of the host computers,” Raman continued. In the letter, Raman cited an investigation of a child porn site that uses The Onion Router Network, or Tor, to anonymize its traffic. The Justice Department argues that it knows the site’s hosting server location, but without a warrant local to the server, the department is prevented from retrieving the server’s user records — including IP and MAC addresses. In most cases, however, law enforcement do not know the physical location of the site’s server, making it impossible to request a specific warrant.
  • In these cases, the Justice Department could request a blanket warrant. This would allow the department to set up a “zero-day” attack on the server — an attack exploiting a manufacturer-unknown or -permitted security flaw, allowing access to the system’s operating software. However, a Texas judge denied the FBI access to such a warrant, saying the Justice Department’s use of “zero-day” attacks in its investigation exposes the public and the target to unknown risks. One typical type of a “zero-day” attack is an infected email that could affect a large number of innocent people if the target used a public computer to access his email. The FBI planned to install a Remote Administration Tool, or RAT, which would distribute such emails in a partially-targeted spam mail distribution. Last year, Federal Magistrate Judge Stephen Smith of the Houston Division of the Southern District of Texas ruled that this was a gross overreach of investigatory intrusion, blocking the plan temporarily. A “zero-day” attack has the potential to activate and control the targeted computer’s peripherals, such as webcams and microphones.
  • ...2 more annotations...
  • Following this ruling, based on the assumptions that federal law enforcement fundamentally act in good faith and that there may be a legitimate need for remote exploitation of computer data, the Justice Department sought to introduce changes to the rules that would overcome Smith’s objections. The proposed change to Rule 41(b) would allow magistrate judges “… to issue a warrant to use remote access to search electronic storage media and to seize electronically stored information located within or outside that district.” The Justice Department has indicated that it wants warrants permitting multiple computers to be searched at the same time, as well as permission to search all of the email and social media accounts accessible from a single computer. Such access would constitute a violation of the Electronic Communications Privacy Act, as the government, under the act, must make demonstrate probable cause to each targeted service provider and obtain and serve a warrant for each service provider. A warrant to search every account active on a computer would be actively bypassing the act’s numerous safeguards.
  • Privacy advocates fear that this rule change would allow prosecutors and the Justice Department to seek out magistrates likely to give them their requested warrants, creating a situation in which the federal government could have a “warrant shop” with just one judge for the whole of the nation. In light of allegations of federal government over-policing — including revelations of aggressive domestic and international electronic spying by the FBI and the National Security Agency — many advocates argue that an examination of the federal government’s commitment to the Fourth Amendment is needed. “The proposed amendment would significantly expand the government’s authority to conduct remote searches of electronic storage media,” the American Civil Liberties Union wrote in a memorandum early last month. “It would also expand the government’s power to engage in computer hacking in the course of criminal investigations, including through the use of malware and other techniques that pose a risk to internet security and that raise Fourth Amendment and policy concerns. “In light of these concerns, the ACLU recommends that the Advisory Committee exercise extreme caution before granting the government new authority to remotely search individuals’ electronic data.” The rules are scheduled to be discussed at the meeting of the Judiciary’s Committee on Rules of Practice and Procedure later this month.
  •  
    The proposed rule change is at pp. 499-501 here. http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Agenda%20Books/Standing/ST2014-05.pdf#page499 (very large PDF).  This is not just about the government being granted permission to exploit vulnerabilities unknown to the computer owner; the issue arose in a case where the government sought judicial permission to implant a Trojan Horse in a suspect's computer. Moreover, the proposed rule goes far beyond the confines of that case, purporting to authorize the government to skip merrily along searching computers not specified in the warrant, along the purported botnet. To put the icing on the cake, the government wants to be relieved from the requirement that they apply for a warrant in the district in which the computer to be searched is located. ("Oh, Goody! Let's start shopping around for the judges we like instead of the ones we are now required to persuade. What? The Mississippi judge refused to sign the warrant? Oh well, let's try it with that other judge we like, the one in Gnome, Alaska.") In other words, what the government seeks is authority for "general warrants," the very evil that the 4th Amendment was designed to outlaw. Even more outrageously, the proposed rule provides in part: "For a warrant to use remote access to search electronic storage media and seize or copy electronically stored information, the officer must make reasonable efforts to serve a copy of the warrant on the person whose property *was* searched or whose information *was* seized or copied. Service may be accomplished by any means, including electronic means, reasonably calculated to reach that person." Not the use of the past tense "was." So after they have drained your computer of all its data, they may permissibly install a batch file that will display a copy of the warrant on your monitor the next time you boot your computer. With a big red lipstick imprint of a kiss imprinted in the warrant's bottom margin, no doubt
  •  
    The proposed rule change is at pp. 499-501 here. http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Agenda%20Books/Standing/ST2014-05.pdf#page499 (very large PDF).  This is not just about the government being granted permission to exploit vulnerabilities unknown to the computer owner; the issue arose in a case where the government sought judicial permission to implant a Trojan Horse in a suspect's computer. Moreover, the proposed rule goes far beyond the confines of that case, purporting to authorize the government to skip merrily along searching computers not specified in the warrant, along the purported botnet. To put the icing on the cake, the government wants to be relieved from the requirement that they apply for a warrant in the district in which the computer to be searched is located. In other words, what the government seeks is authority for "general warrants," the very evil that the 4th Amendment was designed to outlaw. Even more outrageously, the proposed rule provides in part: "For a warrant to use remote access to search electronic storage media and seize or copy electronically stored information, the officer must make reasonable efforts to serve a copy of the warrant on the person whose property *was* searched or whose information *was* seized or copied. Service may be accomplished by any means, including electronic means, reasonably calculated to reach that person." Not the use of the past tense "was." So after they have drained your computer of all its data, they may permissibly install a batch file that will display a copy of the warrant on your monitor the next time you boot your computer. With a big red lipstick imprint of a kiss imprinted at the bottom.  To be continued after this is intially posted to Diigo so the content isn't cut off.   
Gary Edwards

Federal Gestapo tramples on Gibson Guitar, and the 10th Amendment - 0 views

  •  
    Intro to the Diigo Federal Gestapo List.  Includes brief explanation of the10th Amendment movement, ordered liberty, and the Rule of Law.
  • ...2 more comments...
  •  
    Looks like the road to open standards now detours through Redmond, Washington.  Can we still call the destiny "open standards" if proposals have to be filtered through the Microsoft business plan for world domination?  This is not a good day for America.
  •  
    The British Standards Institute, which represents the UK with the International Standards Organization, has issued a " contradiction" to Microsoft's specification.
  •  
    The British Standards Institute, which represents the UK with the International Standards Organization, has issued a " contradiction" to Microsoft's specification.
  •  
    The British Standards Institute, which represents the UK with the International Standards Organization, has issued a " contradiction" to Microsoft's specification.
Gary Edwards

The progressive endgame, and how to prevent it | protein wisdom - 2 views

  • Social Security Administration employees are being instructed to tell people who ask that if the debt ceiling is not raised, their social security benefits could be in danger. In an email sent Friday, obtained by The Daily Caller, employees are instructed: “If a member of the public asks whether their Social Security payment will be affected if the federal debt ceiling is not raised, you may give the following response: ‘Unlike a federal shutdown which has no impact on the payment of Social Security benefits, failure to raise the debt ceiling puts Social Security benefits at risk.’ “Direct all program–related and technical questions to your supervisor.”
  • This was done before in 2011 also and the answer is the same as it was then. Social Security holds $2.6 trillion in special-issue Treasury securities. Those bonds are part of the $14.3 trillion debt amassed by the U.S. government, and benefits are paid out of those securities. So, the theory goes, if Treasury redeemed the needed Social Security bonds, and issued new marketable Treasury bonds to make good on the Social Security bonds, it would be a one for one swap and the debt ceiling would not be increased. There is a technical wrinkle involving the fact that payroll taxes that are collected are supposed to be immediately turned into Treasury securities, but there could be ways around that, such as putting the monies in a noninterest bearing account, as during the 1985 debt crisis. [...] “I’m now 99.9 percent positive that Treasury has legal authority to pay Social Security benefits in both cases of a government shutdown and hitting the debt limit, since the payment of benefits shouldn’t affect the debt limit because it reduces the trust funds to the exact extent that it increase publicly-held debt,” Fichtner said. “What I don’t know is whether Treasury has to pay benefits if it chooses not to.” Dean Baker, co-director of the Center for Economic and Policy Research who has derided “the phony crisis” of Social Security, also believes the checks could keep flowing. “I would think that they could legally pay Social Security by reducing the obligations of the fund,” he said. “It no doubt would be a huge political issue.”
  •  
    Incredible theory, which, if true, would indeed end our Constitutional Republic.
  •  
    Diigo is having problems, I see. Correct link to the article quoted is http://proteinwisdom.com/?p=51354
Gary Edwards

We The Stupid - Ann Barnhardt on the National Debt Ceiling SCAM - 0 views

  •  
    If your angry over the National Debt Ceiling Scam, you're not alone. Ann Barnhardt is fist pounding furious. And with good reason. This is going to be a long battle. One thing i do disagree with her on though is where Obama will borrow the money to fund the $2.4 Trillion debt increase. She's right that no country in the world has $2.4 Trillion to lend us. But the Banksters have plenty! Two weeks ago the GAO released the results of the first time ever inventory of the Federal Reserve Bankster Cartel. They found that the FRBC had created $16.1 Trillion of our money between 2009 and 2010, and passed that money to member Banksters, international Bankster associates, and too-big-to-fail Wall Street gamblers; at near zero percent interest. Combined with the the US TARP bailout, and the AiG - Fannie Mae - Freddie Mac bailouts, the total cost of converting Bankster debt to USA Taxpayer debt tops out at over $23.4 Trillion. The Banksters are flush with dollars, but what are they going to invest in? It's said that the Federal Reserve owns somewhere between 70%- 80% of the US Treasury issued debt. The way this happens however is that the Federal Reserve first "lends" (at near 0%) created dollars to member Banksters. Then the Banksters purchase the Treasuries at 3.25% and up depending on the payout period per note. In effect, American Taxpayers get to borrow back their own money while paying the Banksters a hefty, risk free handling fee of at least 3.25%. So, with $16.1 Trillion sloshing around, and not much too invest in, the Banksters really need Obama to borrow $2.4 Trillion, and spend a whole lot more. At some point this ponzi scheme will collapse, but not today. Least ways not until the Banksters can launder that $16.1 Trillion freebi. My guess is that the Banksters would like to turn the $16.1 Trill into 3.25% bonds, and then into land, indentured tax obligations (inter-generational), and investments in debt free third world countries - where the
  •  
    "- where the game of new world order begins anew. Jaded, cynical, but very much awake and aware...... ~ge~" Sorry, Diigo truncated the comment but only for the Group "End of the American Dream" post. My bookmark actually has the entire comment. Very strange, and i think it's something that might be reported to Maggie. What i have found out is that if you use the diigo plug-in, your comments will be unexpectedly truncated. I've lost losts of stuff over the years. Then i switched to the Chrome plug-in "Share This". There is no truncation, except in the Group view of a post!!! So, the question for Maggie is, "Why are the Group comments to a bookmark unexpectedly truncated?"
Paul Merrell

ExposeFacts - For Whistleblowers, Journalism and Democracy - 0 views

  • Launched by the Institute for Public Accuracy in June 2014, ExposeFacts.org represents a new approach for encouraging whistleblowers to disclose information that citizens need to make truly informed decisions in a democracy. From the outset, our message is clear: “Whistleblowers Welcome at ExposeFacts.org.” ExposeFacts aims to shed light on concealed activities that are relevant to human rights, corporate malfeasance, the environment, civil liberties and war. At a time when key provisions of the First, Fourth and Fifth Amendments are under assault, we are standing up for a free press, privacy, transparency and due process as we seek to reveal official information—whether governmental or corporate—that the public has a right to know. While no software can provide an ironclad guarantee of confidentiality, ExposeFacts—assisted by the Freedom of the Press Foundation and its “SecureDrop” whistleblower submission system—is utilizing the latest technology on behalf of anonymity for anyone submitting materials via the ExposeFacts.org website. As journalists we are committed to the goal of protecting the identity of every source who wishes to remain anonymous.
  • The seasoned editorial board of ExposeFacts will be assessing all the submitted material and, when deemed appropriate, will arrange for journalistic release of information. In exercising its judgment, the editorial board is able to call on the expertise of the ExposeFacts advisory board, which includes more than 40 journalists, whistleblowers, former U.S. government officials and others with wide-ranging expertise. We are proud that Pentagon Papers whistleblower Daniel Ellsberg was the first person to become a member of the ExposeFacts advisory board. The icon below links to a SecureDrop implementation for ExposeFacts overseen by the Freedom of the Press Foundation and is only accessible using the Tor browser. As the Freedom of the Press Foundation notes, no one can guarantee 100 percent security, but this provides a “significantly more secure environment for sources to get information than exists through normal digital channels, but there are always risks.” ExposeFacts follows all guidelines as recommended by Freedom of the Press Foundation, and whistleblowers should too; the SecureDrop onion URL should only be accessed with the Tor browser — and, for added security, be running the Tails operating system. Whistleblowers should not log-in to SecureDrop from a home or office Internet connection, but rather from public wifi, preferably one you do not frequent. Whistleblowers should keep to a minimum interacting with whistleblowing-related websites unless they are using such secure software.
    • Gary Edwards
       
      Thanks Paul! Great article and I agree with you about switching. Rather than a USB, I would rather look into a SSD and try to isolate performance to an ISP bandwidth issue. FYI, I read your Diigo posts daily at this Web site: https://groups.diigo.com/group/socialism-and-the-end-of-the-american-dream/content/user/marbux Seems to be the best visual presentation of your research. I do however think Diigo could improve their hosting of this research by enabling more extensive comments. Notice that your comments are often clipped :( Still, I really do appreciate your sharing both your research and your commentary. Priceless stuff! Many thanks! ~ge~
  •  
    A new resource site for whistle-blowers. somewhat in the tradition of Wikileaks, but designed for encrypted communications between whistleblowers and journalists.  This one has an impressive board of advisors that includes several names I know and tend to trust, among them former whistle-blowers Daniel Ellsberg, Ray McGovern, Thomas Drake, William Binney, and Ann Wright. Leaked records can only be dropped from a web browser running the Tor anonymizer software and uses the SecureDrop system originally developed by Aaron Schwartz. They strongly recommend using the Tails secure operating system that can be installed to a thumb drive and leaves no tracks on the host machine. https://tails.boum.org/index.en.html Curious, I downloaded Tails and installed it to a virtual machine. It's a heavily customized version of Debian. It has a very nice Gnome desktop and blocks any attempt to connect to an external network by means other than installed software that demands encrypted communications. For example, web sites can only be viewed via the Tor anonymizing proxy network. It does take longer for web pages to load because they are moving over a chain of proxies, but even so it's faster than pages loaded in the dial-up modem days, even for web pages that are loaded with graphics, javascript, and other cruft. E.g., about 2 seconds for New York Times pages. All cookies are treated by default as session cookies so disappear when you close the page or the browser. I love my Linux Mint desktop, but I am thinking hard about switching that box to Tails. I've been looking for methods to send a lot more encrypted stuff down the pipe for NSA to store. Tails looks to make that not only easy, but unavoidable. From what I've gathered so far, if you want to install more software on Tails, it takes about an hour to create a customized version and then update your Tails installation from a new ISO file. Tails has a wonderful odor of having been designed for secure computing. Current
Gary Edwards

Obama Losing It Over Über Patriot Edwards Snowden - 2 views

  •  
    This blog was bookmarked by Marbux a few days ago, and i finally had some time to catch up. It's really extraordinary. The information is an analysis of the ongoing battle between Obama and his illegal NSA spying activities and uber patriot, Edward Snowden; and his media connection Glen Greenwald of the UK Guardian. So far the patriots are winning. So often we hear the facts about an issue; the date, time and places stuff. But rarely do we find insightful analysis where the dots are connected. Naked Capitalism provides exactly that kind of insight. Awesome covergage! Covers Congressman Alan Grayson's unsuccessful attempts to hold a hearing on NSA activities. Grayson has scheduled Greenwald to appear and testify before Congress. excerpt: "Shortly after the vote, Alan Grayson invited members to a session scheduled for the morning of Wednesday, July 31, in which Greenwald would testify via video link. Richard Clarke, the chairman of the Counter-terrorism Security Group and a member of the National Security Group, was also scheduled to participate. Within 24 hours of Grayson announcing the meeting, which got the expected considerable interest from members, Clarke withdrew. He initially claimed to have developed a scheduling conflict, but it became clear he'd gotten the Elizabeth Warren treatment from the Administration, of being offered an undisclosed goodie (not of monetary value, but of participation in an insider process) and he was told that participating in this session would preclude his involvement in the other initiative. But that monkey wrench apparently wasn't sufficient. The prospect of having Greenwald and other whistleblowers develop a direct relationship with members of Congress, who had just barely been kept on the reservation, was too threatening to Obama. Jane Hamsher tells us the denouement: President Obama has historically considered the Hill some lower bardo of hell. One of the major complaints of congressional Democrats has always
  •  
    Thanks Paul. Not sure how Google News does that. Especially since the link I followed was from your Diigo bookmark! It had nothing to do with Google News! Also, Diigo does not provide a way to edit the URL???? No editing options???? Must be a new crippleware feature.
Gary Edwards

Walking Away From Your Mortgage: Is it moral? Or is it a legitamate financial option b... - 0 views

  • MM CA said: Mar. 04, 1:28 PM Borrower_underwater: and your point is? defending the banks and mortgage industry? who said his house was dump? he said it was his dream home... pay attention... either way the man and his fmaily were smart enough to save 300k for a down payment. i live in california and the appreciation of housing the past 10 years was irrational and unsustainbale. he boguht three years ago. there was no crisis then. Why woudlnt he buy. Renting now is smart but then? i think you need to inderstand the crisis better. i understand a little bit more than you think i do: see my list of issues/predcitons i developed 3 mtonhs ago... most are coming true...
  • So here lies the squeeze. Originator gets paid per loan made. People in an iron lung are getting approved for subprime. Bank hopes to package loan into CMO and sell to Helsinki or some such. Who is supposed to make sure that the house is really worth what the guy in the iron lung is willing to pay? The appraiser. Not the Originator. Not the bank (we're clearly not talking the good old commmunity bank days were your loan officer knew your neighborhood).
  • it is easy to see where the bank's first protection against a borrower default, correctly establishing a home's value at the time of purchase, falls to the side. That's where it starts to look like the "pay me to rate you" goons at the rating agencies. The populace and ultimate debt holders have counted on the ratings and home valuation process to be clean but simple economic incentives should tell us otherwise.
  • ...1 more annotation...
  • I agree that the argument that "it's priced into the rate" is insufficient, what is sufficient is the fact that the consequences of walking away are actually in the contract! If I stop paying, you take the house. That's why the bank gets to have a lien. It's all part of the deal we signed, remember?. I don't think walking away from the mortgage is even "breaking" the contract. We will simply be exercising a different clause of the contract: foreclosure in lieu of payment.
  •  
    Mortgage lenders absolutely hate borrowers who walk away from underwater mortgages, especially those who could actually afford to keep paying off their mortgages but just decide it isn't worth it. They hate them so much that the term-of-art for these borrowers is "ruthless." But the ethics of mortgage lenders don't have much to recommend them. We need to decide for ourselves whether or not there's a moral obligation to keep paying off a mortgage. For some it's practically a patriotic duty. For others it's a matter of being a good neighbor, since foreclosures could hurt their home values also. Still others say it's just a matter of being a moral person who keeps promises. Great comments to this story. Check out the predictions from MM_CA. They have a diigo highlight. At the time of my reading of this story, the DOW was down 200 pts to 6678.95. The Supreme Leader is busy conducting a healthcare summit, claiming that "fixing" (read "nationalizing") the healthcare system will result in so many jobs that the economy will turn around. The comments are well worth the time!
1 - 10 of 10
Showing 20 items per page