Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged science

Rss Feed Group items tagged

Paul Merrell

Cy Vance's Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities | Jus... - 0 views

  • Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s District Attorney, released a policy paper calling for legislation requiring companies to provide the government with backdoor access to their smartphones and other mobile devices. This is the first concrete proposal of this type since September 2014, when FBI Director James Comey reignited the “Crypto Wars” in response to Apple’s and Google’s decisions to use default encryption on their smartphones. Though Comey seized on Apple’s and Google’s decisions to encrypt their devices by default, his concerns are primarily related to end-to-end encryption, which protects communications that are in transit. Vance’s proposal, on the other hand, is only concerned with device encryption, which protects data stored on phones. It is still unclear whether encryption played any role in the Paris attacks, though we do know that the attackers were using unencrypted SMS text messages on the night of the attack, and that some of them were even known to intelligence agencies and had previously been under surveillance. But regardless of whether encryption was used at some point during the planning of the attacks, as I lay out below, prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption. Vance’s primary complaint is that Apple’s and Google’s decisions to provide their customers with more secure devices through encryption interferes with criminal investigations. He claims encryption prevents law enforcement from accessing stored data like iMessages, photos and videos, Internet search histories, and third party app data. He makes several arguments to justify his proposal to build backdoors into encrypted smartphones, but none of them hold water.
  • Before addressing the major privacy, security, and implementation concerns that his proposal raises, it is worth noting that while an increase in use of fully encrypted devices could interfere with some law enforcement investigations, it will help prevent far more crimes — especially smartphone theft, and the consequent potential for identity theft. According to Consumer Reports, in 2014 there were more than two million victims of smartphone theft, and nearly two-thirds of all smartphone users either took no steps to secure their phones or their data or failed to implement passcode access for their phones. Default encryption could reduce instances of theft because perpetrators would no longer be able to break into the phone to steal the data.
  • Vance argues that creating a weakness in encryption to allow law enforcement to access data stored on devices does not raise serious concerns for security and privacy, since in order to exploit the vulnerability one would need access to the actual device. He considers this an acceptable risk, claiming it would not be the same as creating a widespread vulnerability in encryption protecting communications in transit (like emails), and that it would be cheap and easy for companies to implement. But Vance seems to be underestimating the risks involved with his plan. It is increasingly important that smartphones and other devices are protected by the strongest encryption possible. Our devices and the apps on them contain astonishing amounts of personal information, so much that an unprecedented level of harm could be caused if a smartphone or device with an exploitable vulnerability is stolen, not least in the forms of identity fraud and credit card theft. We bank on our phones, and have access to credit card payments with services like Apple Pay. Our contact lists are stored on our phones, including phone numbers, emails, social media accounts, and addresses. Passwords are often stored on people’s phones. And phones and apps are often full of personal details about their lives, from food diaries to logs of favorite places to personal photographs. Symantec conducted a study, where the company spread 50 “lost” phones in public to see what people who picked up the phones would do with them. The company found that 95 percent of those people tried to access the phone, and while nearly 90 percent tried to access private information stored on the phone or in other private accounts such as banking services and email, only 50 percent attempted contacting the owner.
  • ...8 more annotations...
  • In addition to his weak reasoning for why it would be feasible to create backdoors to encrypted devices without creating undue security risks or harming privacy, Vance makes several flawed policy-based arguments in favor of his proposal. He argues that criminals benefit from devices that are protected by strong encryption. That may be true, but strong encryption is also a critical tool used by billions of average people around the world every day to protect their transactions, communications, and private information. Lawyers, doctors, and journalists rely on encryption to protect their clients, patients, and sources. Government officials, from the President to the directors of the NSA and FBI, and members of Congress, depend on strong encryption for cybersecurity and data security. There are far more innocent Americans who benefit from strong encryption than there are criminals who exploit it. Encryption is also essential to our economy. Device manufacturers could suffer major economic losses if they are prohibited from competing with foreign manufacturers who offer more secure devices. Encryption also protects major companies from corporate and nation-state espionage. As more daily business activities are done on smartphones and other devices, they may now hold highly proprietary or sensitive information. Those devices could be targeted even more than they are now if all that has to be done to access that information is to steal an employee’s smartphone and exploit a vulnerability the manufacturer was required to create.
  • Privacy is another concern that Vance dismisses too easily. Despite Vance’s arguments otherwise, building backdoors into device encryption undermines privacy. Our government does not impose a similar requirement in any other context. Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation. The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.
  • Vance attempts to downplay this serious risk by asserting that anyone can use the “Find My Phone” or Android Device Manager services that allow owners to delete the data on their phones if stolen. However, this does not stand up to scrutiny. These services are effective only when an owner realizes their phone is missing and can take swift action on another computer or device. This delay ensures some period of vulnerability. Encryption, on the other hand, protects everyone immediately and always. Additionally, Vance argues that it is safer to build backdoors into encrypted devices than it is to do so for encrypted communications in transit. It is true that there is a difference in the threats posed by the two types of encryption backdoors that are being debated. However, some manner of widespread vulnerability will inevitably result from a backdoor to encrypted devices. Indeed, the NSA and GCHQ reportedly hacked into a database to obtain cell phone SIM card encryption keys in order defeat the security protecting users’ communications and activities and to conduct surveillance. Clearly, the reality is that the threat of such a breach, whether from a hacker or a nation state actor, is very real. Even if companies go the extra mile and create a different means of access for every phone, such as a separate access key for each phone, significant vulnerabilities will be created. It would still be possible for a malicious actor to gain access to the database containing those keys, which would enable them to defeat the encryption on any smartphone they took possession of. Additionally, the cost of implementation and maintenance of such a complex system could be high.
  • Vance also suggests that the US would be justified in creating such a requirement since other Western nations are contemplating requiring encryption backdoors as well. Regardless of whether other countries are debating similar proposals, we cannot afford a race to the bottom on cybersecurity. Heads of the intelligence community regularly warn that cybersecurity is the top threat to our national security. Strong encryption is our best defense against cyber threats, and following in the footsteps of other countries by weakening that critical tool would do incalculable harm. Furthermore, even if the US or other countries did implement such a proposal, criminals could gain access to devices with strong encryption through the black market. Thus, only innocent people would be negatively affected, and some of those innocent people might even become criminals simply by trying to protect their privacy by securing their data and devices. Finally, Vance argues that David Kaye, UN Special Rapporteur for Freedom of Expression and Opinion, supported the idea that court-ordered decryption doesn’t violate human rights, provided certain criteria are met, in his report on the topic. However, in the context of Vance’s proposal, this seems to conflate the concepts of court-ordered decryption and of government-mandated encryption backdoors. The Kaye report was unequivocal about the importance of encryption for free speech and human rights. The report concluded that:
  • States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online. … States should not restrict encryption and anonymity, which facilitate and often enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows. Additionally, the group of intelligence experts that was hand-picked by the President to issue a report and recommendations on surveillance and technology, concluded that: [R]egarding encryption, the U.S. Government should: (1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.
  • The clear consensus among human rights experts and several high-ranking intelligence experts, including the former directors of the NSA, Office of the Director of National Intelligence, and DHS, is that mandating encryption backdoors is dangerous. Unaddressed Concerns: Preventing Encrypted Devices from Entering the US and the Slippery Slope In addition to the significant faults in Vance’s arguments in favor of his proposal, he fails to address the question of how such a restriction would be effectively implemented. There is no effective mechanism for preventing code from becoming available for download online, even if it is illegal. One critical issue the Vance proposal fails to address is how the government would prevent, or even identify, encrypted smartphones when individuals bring them into the United States. DHS would have to train customs agents to search the contents of every person’s phone in order to identify whether it is encrypted, and then confiscate the phones that are. Legal and policy considerations aside, this kind of policy is, at the very least, impractical. Preventing strong encryption from entering the US is not like preventing guns or drugs from entering the country — encrypted phones aren’t immediately obvious as is contraband. Millions of people use encrypted devices, and tens of millions more devices are shipped to and sold in the US each year.
  • Finally, there is a real concern that if Vance’s proposal were accepted, it would be the first step down a slippery slope. Right now, his proposal only calls for access to smartphones and devices running mobile operating systems. While this policy in and of itself would cover a number of commonplace devices, it may eventually be expanded to cover laptop and desktop computers, as well as communications in transit. The expansion of this kind of policy is even more worrisome when taking into account the speed at which technology evolves and becomes widely adopted. Ten years ago, the iPhone did not even exist. Who is to say what technology will be commonplace in 10 or 20 years that is not even around today. There is a very real question about how far law enforcement will go to gain access to information. Things that once seemed like merely science fiction, such as wearable technology and artificial intelligence that could be implanted in and work with the human nervous system, are now available. If and when there comes a time when our “smart phone” is not really a device at all, but is rather an implant, surely we would not grant law enforcement access to our minds.
  • Policymakers should dismiss Vance’s proposal to prohibit the use of strong encryption to protect our smartphones and devices in order to ensure law enforcement access. Undermining encryption, regardless of whether it is protecting data in transit or at rest, would take us down a dangerous and harmful path. Instead, law enforcement and the intelligence community should be working to alter their skills and tactics in a fast-evolving technological world so that they are not so dependent on information that will increasingly be protected by encryption.
Gary Edwards

An Inconvenient Truth: Liberal Climate Inquisition Can't Explain Past Temperature Changes - 0 views

  • For instance, the chart above shows reconstructed average world temperature data for the past 500,000 years. Depending on the magnification and size of your monitor, each pencil dot would span something on the order of 1,000 years. The myriad 10-degree Celsius temperature flips all happened before man-made carbon dioxide could have had any impact—the final temperature spike started at the end of the last ice age.
  • Now see if you can follow this: The “science thought police” insist that even though none of the temperature variations for the first 499,950 years had anything to do with human activity, virtually none of the temperature increases of the past 50 years had anything to do with nature. Got it?
  •  
    "In the week prior to the administration signing what should constitute an international climate treaty, one think tank, the Competitive Enterprise Institute, was subpoenaed for casting doubt on the agreement's associated science of climate catastrophe. As disturbing as such thuggery from state attorneys general would be in any case, the premise of the subpoena is faulty. The Competitive Enterprise Institute did not cast doubt on the dubious climate science. The actual data cast the doubt. The think tank and others have simply pointed out what the data show. It looks like thoughtcrime has now moved from George Orwell's novel "1984" to the twisted reality of our judicial system. Pointing out facts should never be a real crime. The Heritage Foundation's new Paris-bubble-popping science summary is also a case of letting the numbers tell a story. A story many never hear in the media-hyped spectacle that is international climate policy."
Paul Merrell

US groups want presidential candidates to answer 20 science questions | us-presidential... - 0 views

  • A coalition of US groups representing more than 10 million scientists and engineers published 20 questions on Wednesday they want every US presidential candidate to answer ahead of November’s vote. The questions range from how to support vaccine science, to defining the scope of America’s goals in space, to the candidates’ views on climate change and what would they would do about it. Stances on nuclear power, protecting the world’s oceans, reducing the human and economic costs of mental illness, and the controversy over visa programs that allow highly skilled immigrants into the United States also feature in the list, made public by the American Association for the Advancement of Science (AAAS).
  • The full list is available at ScienceDebate.org/20qs. The 56 groups that helped create the list by crowd sourcing the questions has asked for the candidates to answer the questions by September 6. All are described by AAAS as non-partisan groups, including the National Academy of Sciences, the American Geophysical Union, the American Chemical Society and the Union of Concerned Scientists.
Paul Merrell

Weak Federal Powers Could Limit Trump's Climate-Policy Rollback - The New York Times - 0 views

  • With Donald J. Trump about to take control of the White House, it would seem a dark time for the renewable energy industry. After all, Mr. Trump has mocked the science of global warming as a Chinese hoax, threatened to kill a global deal on climate change and promised to restore the coal industry to its former glory.
  • We do not know for sure that the New York wind farm will get built, but we do know this: The energy transition is real, and Mr. Trump is not going to stop it. Advertisement Continue reading the main story On a global scale, more than half the investment in new electricity generation is going into renewable energy. That is more than $300 billion a year, a sign of how powerful the momentum has become.Wind power is booming in the United States, with the industry adding manufacturing jobs in the reddest states. When Mr. Trump’s appointees examine the facts, they will learn that wind-farm technician is projected to be the fastest-growing occupation in America over the next decade.The election of Mr. Trump left climate activists and environmental groups in despair. They had pinned their hopes on a Hillary Clinton victory and a continuation of President Obama’s strong push to tackle global warming.
  • Now, of course, everything is in flux. In the worst case, with a sufficiently pliant Congress, Mr. Trump could roll back a decade of progress on climate change. Barring some miraculous conversion on Mr. Trump’s part, his election cannot be interpreted as anything but bad news for the climate agenda.Yet despair might be an overreaction.For starters, when Mr. Trump gets to the White House, he will find that the federal government actually has relatively little control over American energy policy, and particularly over electricity generation. The coal industry has been ravaged in part by cheap natural gas, which is abundant because of technological changes in the way it is produced, and there is no lever in the Oval Office that Mr. Trump can pull to reverse that.The intrinsically weak federal role was a source of frustration for Mr. Obama and his aides, but now it will work to the benefit of environmental advocates. They have already persuaded more than half the states to adopt mandates on renewable energy. Efforts to roll those back have largely failed, with the latest development coming only last week, when Gov. John Kasich of Ohio, a Republican, vetoed a rollback bill.
Paul Merrell

The Rockefeller Family Fund vs. Exxon | by David Kaiser | The New York Review... - 0 views

  • Earlier this year our organization, the Rockefeller Family Fund (RFF), announced that it would divest its holdings in fossil fuel companies. We mean to do this gradually, but in a public statement we singled out ExxonMobil for immediate divestment because of its “morally reprehensible conduct.”1 For over a quarter-century the company tried to deceive policymakers and the public about the realities of climate change, protecting its profits at the cost of immense damage to life on this planet.Our criticism carries a certain historical irony. John D. Rockefeller founded Standard Oil, and ExxonMobil is Standard Oil’s largest direct descendant. In a sense we were turning against the company where most of the Rockefeller family’s wealth was created. (Other members of the Rockefeller family have been trying to get ExxonMobil to change its behavior for over a decade.) Approached by some reporters for comment, an ExxonMobil spokesman replied, “It’s not surprising that they’re divesting from the company since they’re already funding a conspiracy against us.”2What we had funded was an investigative journalism project. With help from other public charities and foundations, including the Rockefeller Brothers Fund (RBF), we paid for a team of independent reporters from Columbia University’s Graduate School of Journalism to try to determine what Exxon and other US oil companies had really known about climate science, and when. Such an investigation seemed promising because Exxon, in particular, has been a leader of the movement to deny the facts of climate change.3 Often working indirectly through front groups, it sponsored many of the scientists and think tanks that have sought to obfuscate the scientific consensus about the changing climate, and it participated in those efforts through its paid advertisements and the statements of its executives.
  • t seemed to us, however, that for business reasons, a company as sophisticated and successful as Exxon would have needed to know the difference between its own propaganda and scientific reality. If it turned out that Exxon and other oil companies had recognized the validity of climate science even while they were funding the climate denial movement, that would, we thought, help the public understand how artificially manufactured and disingenuous the “debate” over climate change has always been. In turn, we hoped this understanding would build support for strong policies addressing the crisis of global warming.Indeed, the Columbia reporters learned that Exxon had understood and accepted the validity of climate science long before embarking on its denial campaign, and in the fall of 2015 they published their discoveries in The Los Angeles Times.4 Around the same time, another team of reporters from the website InsideClimate News began publishing the results of similar research.5 (The RFF has made grants to InsideClimate News, and the RBF has been one of its most significant funders, but we didn’t know they were engaged in this project.) The reporting by these two different groups was complementary, each confirming and adding to the other’s findings.
  • Following publication of these articles, New York Attorney General Eric Schneiderman began investigating whether ExxonMobil had committed fraud by failing to disclose many of the business risks of climate change to its shareholders despite evidence that it understood those risks internally. Massachusetts Attorney General Maura Healey soon followed Schneiderman with her own investigation, as did the AGs of California and the Virgin Islands, and thirteen more state AGs announced that they were considering investigations.Bernie Sanders and Hillary Clinton each called for a federal investigation of ExxonMobil by the Department of Justice. Secretary of State John Kerry compared Exxon’s deceptions to the tobacco industry’s long denial of the danger of smoking, predicting that, if the allegations were true, Exxon might eventually have to pay billions of dollars in damages “in what I would imagine would be one of the largest class-action lawsuits in history.”6 Most recently, in August, the Securities and Exchange Commission began investigating the way ExxonMobil values its assets, given the world’s growing commitment to reducing carbon emissions. An article in The Wall Street Journal observed that this “could have far-reaching consequences for the oil and gas industry.”7
  • ...1 more annotation...
  • We didn’t expect ExxonMobil to admit that it had been at fault. It is one of the largest companies in the world—indeed, if its revenues are compared to the gross domestic products of nations, it has one of the world’s larger economies, bigger than Austria’s, for example, or Thailand’s8—and it has a reputation for unusual determination in promoting its self-interest.9 One way or another, we expected it to fight back—most likely, we thought, by proxy, through its surrogates in the right-wing press and in Congress.Sure enough, various bloggers have been calling for “the Rockefellers”10 to be prosecuted by the government for “conspiracy” against Exxon under the Racketeer Influenced and Corrupt Organizations (RICO) Act.11 (Such lines of attack are being tested and refined, and we expect they will soon be repeated in journals with broader readership.) And in May, Texas Republican Lamar Smith, the chair of the House Committee on Science, Space, and Technology, sent a letter to the RFF and seven other NGOs (including the RBF, 350.org, Greenpeace, and the Union of Concerned Scientists),12 as well as all seventeen AGs who said they might investigate ExxonMobil. He accused us of engaging in “a coordinated effort to deprive companies, nonprofit organizations, and scientists of their First Amendment rights and ability to fund and conduct scientific research free from intimidation and threats of prosecution,” and demanded that we turn over to him all private correspondence between any of the recipients of his letter relating to any potential climate change investigation. When we all refused, twice, to surrender any such correspondence, Smith subpoenaed Schneiderman, Healey, and all eight NGOs for the same documents.We will answer Smith’s accusations against us presently. In order to explain ourselves, however, we first have to explain what Exxon knew about climate change, and when—and what, despite that knowledge, Exxon did: the morally reprehensible conduct that prompted our actions in the first place.
  •  
    A must-read. Very nice fully referenced rendition on what Exxon-Mobil knew when about climate change and the efforts they made to mislead the public.
Paul Merrell

Pentagon preparing for mass civil breakdown | Nafeez Ahmed | Environment | theguardian.com - 0 views

  • A US Department of Defense (DoD) research programme is funding universities to model the dynamics, risks and tipping points for large-scale civil unrest across the world, under the supervision of various US military agencies. The multi-million dollar programme is designed to develop immediate and long-term "warfighter-relevant insights" for senior officials and decision makers in "the defense policy community," and to inform policy implemented by "combatant commands." Launched in 2008 – the year of the global banking crisis – the DoD 'Minerva Research Initiative' partners with universities "to improve DoD's basic understanding of the social, cultural, behavioral, and political forces that shape regions of the world of strategic importance to the US."
  • Twitter posts and conversations will be examined "to identify individuals mobilised in a social contagion and when they become mobilised."
  • Last year, the DoD's Minerva Initiative funded a project to determine 'Who Does Not Become a Terrorist, and Why?' which, however, conflates peaceful activists with "supporters of political violence" who are different from terrorists only in that they do not embark on "armed militancy" themselves. The project explicitly sets out to study non-violent activists
  • ...3 more annotations...
  • According to Prof David Price, a cultural anthropologist at St Martin's University in Washington DC and author of Weaponizing Anthropology: Social Science in Service of the Militarized State, "when you looked at the individual bits of many of these projects they sort of looked like normal social science, textual analysis, historical research, and so on, but when you added these bits up they all shared themes of legibility with all the distortions of over-simplification. Minerva is farming out the piece-work of empire in ways that can allow individuals to disassociate their individual contributions from the larger project."Prof Price has previously exposed how the Pentagon's Human Terrain Systems (HTS) programme - designed to embed social scientists in military field operations - routinely conducted training scenarios set in regions "within the United States." Citing a summary critique of the programme sent to HTS directors by a former employee, Price reported that the HTS training scenarios "adapted COIN [counterinsurgency] for Afghanistan/Iraq" to domestic situations "in the USA where the local population was seen from the military perspective as threatening the established balance of power and influence, and challenging law and order."
  • One war-game, said Price, involved environmental activists protesting pollution from a coal-fired plant near Missouri, some of whom were members of the well-known environmental NGO Sierra Club. Participants were tasked to "identify those who were 'problem-solvers' and those who were 'problem-causers,' and the rest of the population whom would be the target of the information operations to move their Center of Gravity toward that set of viewpoints and values which was the 'desired end-state' of the military's strategy."Such war-games are consistent with a raft of Pentagon planning documents which suggest that National Security Agency (NSA) mass surveillance is partially motivated to prepare for the destabilising impact of coming environmental, energy and economic shocks.
  • Minerva is a prime example of the deeply narrow-minded and self-defeating nature of military ideology. Worse still, the unwillingness of DoD officials to answer the most basic questions is symptomatic of a simple fact – in their unswerving mission to defend an increasingly unpopular global system serving the interests of a tiny minority, security agencies have no qualms about painting the rest of us as potential terrorists.
Gary Edwards

REVEALING QUOTES ON THE GOALS OF PSYCHIATRY AND PSYCHOLOGY - 0 views

  • Psychiatry's Views on Conservatives "In August 2003, the National Institute of Mental Health (NIMH) and the National Science Foundation (NSF) announced the results of their $1.2 million taxpayer-funded study. It stated, essentially, that traditionalists are mentally disturbed. Scholars from the Universities of Maryland, California at Berkeley, and Stanford had determined that social conservatives, in particular, suffer from ‘mental rigidity,’ ‘dogmatism,’ and ‘uncertainty avoidance,’ together with associated indicators for mental illness."
  • Psychiatry's Views on Education "Every child in America entering school at the age of five is insane because he comes to school with certain allegiances to our founding fathers, toward our elected officials, toward his parents, toward a belief in a supernatural being, and toward the sovereignty of this nation as a separate entity. It’s up to you as teachers to make all these sick children well – by creating the international child of the future"
  • Teaching school children to read was a "perversion" and high literacy rate bred "the sustaining force behind individualism."
  • ...59 more annotations...
  • You see, one of the effects of self-esteem (Values Clarification) programs is that you are no longer obliged to tell the truth if you don’t feel like it. You don’t have to tell the truth because if the truth you have to tell is about your own failure then your self-esteem will go down and that is unthinkable."
  • The social psychologist of the future will have a number of classes of school children on whom they will try different methods of producing an unshakable conviction that snow is black. Various results will soon be arrived at: first, that influences of the home are 'obstructive' and verses set to music and repeatedly intoned are very effective ..
  • When the technique has been perfected, every government that has been in charge of education for more than one generation will be able to control its subjects securely without the need of armies or policemen."
  • "…through schools of the world we shall disseminate a new conception of government – one that will embrace all of the collective activities of men; one that will postulate the need for scientific control and operation of economic activities in the interests of all people."
  • "Education does not mean teaching people to know what they do not know – it means teaching them to behave as they do not behave." 
  • "This is the idea where we drop subject matter and we drop Carnegie Unites (grading from A-F) and we just let students find their way, keeping them in school until they manifest the politically correct attitudes.
  • "I regard myself as one of the most dangerous enemies of religion" Sigmund Freud
  • "Education is thus a most power ally of humanism, and every public school is a school of humanism. What can the theistic Sunday school, meeting for an hour once a week, and teaching only a fraction of the children, do to stem the tide of a five-day program of humanistic teachings?"
  • "Despite rapid progress in the right direction, the program of the average elementary school has been primarily devoted to teaching the fundamental subjects, the three R’s, and closely related disciplines… Artificial exercises, like drills on phonetics, multiplication tables, and formal writing movements, are used to a wasteful degree. Subjects such as arithmetic, language, and history include content that is intrinsically of little value. Nearly every subject is enlarged unwisely to satisfy the academic ideal of thoroughness… Elimination of the unessential by scientific study, then, is one step in improving the curriculum."
  • "We can therefore justifiably stress our particular point of view with regard to the proper development of the human psyche, even though our knowledge be incomplete. We must aim to make it permeate every educational activity in our national life…. We have made a useful attack upon a number of professions. The two easiest of them naturally are the teaching profession and the Church: the two most difficult are law and medicine."
  • "...a student attains 'higher order thinking' when he no longer believes in right or wrong"
  • "A large part of what we call good teaching is a teacher´s ability to obtain affective objectives by challenging the student's fixed beliefs.  …a large part of what we call teaching is that the teacher should be able to use education to reorganize a child's thoughts, attitudes, and feelings."  
  • "Education should aim at destroying free will so that after pupils are thus schooled they will be incapable throughout the rest of their lives of thinking or acting otherwise than as their school masters would have wished
  • Psychiatry's Views on Religion "Religion (is) a universal obsessional neurosis." Sigmund Freud, defining spiritual belief
  • "The educational system should be a sieve, through which all the children of a country are passed. It is highly desirable that no child escape inspection."
  • "The soul or consciousness, which played the leading part in the past, now is of very little importance; in any case both are deprived of their main functions and glory to such an extent that only the names remain. Behaviorism sang their funeral dirge while materialism – the smiling heir – arranges a suitable funeral for them.
  • "…humanists still believe that traditional theism, especially faith in the prayer-hearing God, assumed to love and care for persons, to hear and understand their prayers, and to be able to do something about them, is an unproved and outmoded faith." "
  • "We can therefore justifiably stress our particular point of view with regard to the proper development of the human psyche, even though our knowledge be incomplete. We must aim to make it permeate every educational activity in our national life…. We have made a useful attack upon a number of professions. The two easiest of them naturally are the teaching profession and the Church: the two most difficult are law and medicine."
  • We shall not solve the problems of alcoholism and juvenile delinquency by increasing a sense of responsibility. It is the environment which is 'responsible' for the objectionable behavior, and it is the environment, not some attribute of the individual, which must be changed.
  • Psychiatry's Views on Creating a Slave Society "We can choose to use our growing knowledge to enslave people in ways never dreamed of before, depersonalizing them, controlling them by means so carefully selected that they will perhaps never be aware of their loss of personhood."
  • Teaching school children to read was a "perversion" and high literacy rate bred "the sustaining force behind individualism."
  • "It will of course, be understood that directly or indirectly, soon or late, every advance in the sciences of human nature will contribute to our success in controlling human nature and changing it to the advantage of the common wheel." Edward Thorndike, Key Psychology Theorist, member of the "Eugenics Committee of the USA"
  • "We need a program of psychosurgery for political control of our society. The purpose is physical control of the mind. Everyone who deviates from the given norm can be surgically mutilated.
  • The individual may think that the most important reality is his own existence, but this is only his personal point of view. . . Man does not have the right to develop his own mind. . . . We must electronically control the brain. Someday armies and generals will be controlled by electronic stimulation of the brain." 
  • "Education should aim at destroying free will so that after pupils are thus schooled they will be incapable throughout the rest of their lives of thinking or acting otherwise than as their school masters would have wished
  • "One of the least understood strategies of the world revolution now moving rapidly toward its goal is the use of mind control as a major means of obtaining the consent of the people who will be subjects of the New World Order."
  • "Those of us who work in this field see a developing potential for nearly a total control of human emotional status, mental functioning, and will to act. These human phenomena can be started, stopped or eliminated by the use of various types of chemical substances. What we can produce with our science now will affect the entire society." A "utopia" could be found – providing "a sense of stability and certainty, whether realistic or not."
  • "To achieve world government, it is necessary to remove from the minds of men their individualism, loyalty to family traditions, national patriotism and religious dogmas..."
  • Some packages even include instructions on how to deal with parents and others who object. Stripping away psychological defenses can be done through assignments to keep diaries to be discussed in group sessions, and through role-playing assignments, both techniques used in the original brainwashing programs in China under Mao. Thomas Sowell, writing in Forbes, 1991
  • "The State is the absolute reality and the individual himself has objective existence, truth and morality only in his capacity as a member of the State." Hegel (who influenced Karl Marx)
  • Psychiatry's Views on America "America is a mistake, admittedly a gigantic mistake, but a mistake nevertheless." Sigmund Freud America is the most grandiose experiment the world has seen, but, I am afraid, it is not going to be a success. Sigmund Freud
  • "To achieve world government, it is necessary to remove from the minds of men their individualism, loyalty to family traditions, national patriotism and religious dogmas...
  • "One of the least understood strategies of the world revolution now moving rapidly toward its goal is the use of mind control as a major means of obtaining the consent of the people who will be subjects of the New World Order."
  • Freud on Marxism "The strength of Marxism obviously does not lie in its view of history or in the prophecies about the future which it bases upon that view, but in its clear insight into the determining influence which is exerted by the economic conditions of man upon his intellectual, ethical and artistic reactions." Sigmund Freud
  • Basically, all that is necessary to revoke all the constitutional rights of any citizen is to accuse him of being mentally-ill."
  • John A. Stormer, "None Dare Call it Treason"
  • "Old conventions, customs and values… to be challenged… The aim should be to control not only nature, but human nature." He recommended two slogans for "spreading world-wide the gospel of mental hygiene": "To learn to think internationally" and "The necessity to disarm the mind." Dr. J.R. Lord, psychiatrist
  • "Public life, politics and industry should all of them be within our sphere of influence…. If we are to infiltrate the professional and social activities of other people I think we must imitate the Totalitarians and organize some kind of fifth column activity!  If better ideas on mental health are to progress and spread we, as the salesmen, must lose our identity… Let us all, therefore, very secretly be ‘fifth columnists.’"
  • The techniques of brainwashing developed in totalitarian countries are routinely used in psychological conditioning programs imposed on school children.
  • These include emotional shock and desensitization, psychological isolation from sources of support, stripping away defenses, manipulative cross-examination of the individual’s underlying moral values by psychological rather than rational means. These techniques are not confined to separate courses or programs...they are not isolated idiosyncracies of particular teachers. They are products of numerous books and other educational materials in programs packaged by organizations that sell such curricula to administrators and teach the techniques to teachers.
  • "If all else fails, punishable behavior may be made less likely by changing physiological conditions. Hormones may be used to change sexual behavior, surgery (as in lobotomy) to control violence, tranquilizers to control aggression, and appetite depressants to control overeating." Harvard psychologist B.F. Skinner in "Beyond Freedom and Dignity"
  • We must learn to recognize them for what they are - possessors of no special knowledge of the human psyche, who have, nonetheless, chosen to earn their living from the dissemination of the myth that they do indeed know how the mind works". Psychiatrist Garth Wood, M.D., in "The Myth of Neurosis", 1986
  • These terms indicate only approval or disapproval of some aspect of a person's mentality (thinking, emotions, or behavior). Psychiatrist E. Fuller Torrey, in "The Death of Psychiatry", 1974
  • "The very term ['mental disease'] is nonsensical, a semantic mistake. The two words cannot go together except metaphorically; you can no more have a mental 'disease' than you can have a purple idea or a wise space". Similarly, there can no more be a "mental illness" than there can be a "moral illness." The words "mental" and "illness" do not go together logically. Mental "illness" does not exist, and neither does mental "health."
  • By calling the harmless 'insane', (who statistics prove to be no more violence-prone than the average citizen, unless hopelessly deranged by damaging psychiatric 'treatment'), dangerous and justifying their own existence by the 'need' to deal with that inflated 'danger', the mad-doctors themselves pose the greatest threat to liberty, property and democracy in our times."
  • Citizens for Higher Ethical Standards in Medicine
  • "Mental illness is often used as an ad homonym to discredit the individual. This has been a common use of psychiatric diagnosis in psychiatry in Russia. " ... there are two main groups [of schizophrenia patients] ... 1) people admitted to the mental hospital long before they had been political dissenters ... 2. others who ... have put forward complex social and economic theories as alternatives to orthodox Marxism..."  Wing, cited in "Pseudoscience in Psychology", by Dr. Szasz, p. 126
  • "It is no measure of health to be well adjusted to a profoundly sick society.." J. Krishnamurti
  • "...the subject which will be of most importance politically is Mass Psychology.... The populace will not be allowed to know how its convictions were generated. When the technique has been perfected, every government that has been in charge of education for a generation will be able to control its subjects securely without the need of armies or policemen. As yet there is only one country which has succeeded in creating this politician’s paradise."   The Impact of Science on Society by Bertrand Russell
  • "A Trojan horse full of dangerous psycho-fantasies has been professionally prepared for us by Christian psychiatrists and psychologists...  At the base, such therapies stand upon dogma, not scientific observations, and the dogma is the odious one of Freud and his followers who were some of the century's most anti-Christ teachers.  No amount of well-intentioned refinement of deadly doctrines will make them clean for Christians." Dr. Hilton P. Terrell, M.D
  • "Contrary to the popular public conception, this happenstance is NOT a form of health care, but the result of a fraudulent system being granted police powers by the State.
  • "Psychotherapy may be known in the future as the greatest hoax of the twentieth century."
  • "Nearly half a century has passed since Watson proclaimed his manifesto. Today, apart from a few minor reservations, the vast majority of psychologists, both in this country and in America, still follow his lead. The result, as a cynical onlooker might be tempted to say, is that psychology, having first bargained away its soul and then gone out of its mind, seems now, as it faces an untimely end, to have lost all consciousness." 
  • "Advocates of psychiatric drugs often claim that the medications improve learning and the ability to benefit from psychotherapy, but the contrary is true.  There are no drugs that improve mental function, self-understanding, or human relations.  Any drug that affects mental processes does so by impairing them."
  • "In the 14-year period between 1950 and 1964, more American deaths occurred in state and county mental institutions than in all of the nation's armed conflicts beginning with the Revolutionary War and ending with the Persian Gulf War.  Between 1965 and 1990, the total number of mental-hospital inpatient deaths exceeded the number of battle deaths in the same wars by 70 percent.  Inpatient deaths topped out at 1,103,000 during this 25-year period, compared with 650,563 recorded deaths in battles."
  • Kelly Patricia O’Meara: "The Forgotten Dead of St. Elizabeth's", Insight Magazine, June 16, 2001
  • "The similarities between street drug abuse and psychotropic prescription drug use are disturbing. Both types are toxic. Both can cause psychosis, damage the brain and other organs, and even cause death. And neither type of mind-altering drugs, legal or illegal, treats disease. It's important to recognize that the only significant difference between many prescription psychotropic drugs and street drugs such as "speed" and "downers" is that prescription drugs are legal."
  • Neuro-psychiatrist Sydney Walker in "Dose of Sanity"
  • "Clearly this business of treating minds, particularly this big business of treating young minds, has not policed itself, and has no incentive to put a stop to the kinds of fraudulent and unethical practices that are going on."
Gary Edwards

Stifling Debate With Public Funds? « Opportunity Knocks Walt Hucks - 0 views

  • As a public employee myself, I know how these things happen: a committee is appointed, not because of their expertise, but because they are tongue-in-groove buttlickers for the political appointees they report to. As such, their conclusions are unsurprisingly always exactly what the appointees wanted to hear.
  •  
    Walt has published an excellent response to an article published by suedo-scientific fascist, Richard Somerville. Walt displays some excellent writing skills and logical level-headed thinking as he rips the idiot Somerville to shreds.  Wlat also has a great line i would like to poach, with his permission of course: "they are tongue-in-groove buttlickers for the political appointees they report to" "As a public employee myself, I know how these things happen: a committee is appointed, not because of their expertise, but because they are tongue-in-groove buttlickers for the political appointees they report to. As such, their conclusions are unsurprisingly always exactly what the appointees wanted to hear." excerpt: Is This Science? Or Religion? The Scripps Institution of Oceanography at the University of California, San Diego, has published an article entitled, "A Response to Climate Change Denialism". The article is pure politics-and-religion style campaign literature. This on a site that is paid for by Californians' taxes. It is reproduced below in its entirety, both to preserve the evidence, and to facilitate commentary.
Gary Edwards

Affidavit of John Lear concerning 911 --- Deposition in legal matter: ECF vs Science Ap... - 1 views

  •  
    Incredible affidavit detailing the testimony of aviation expert John Lear.  Also see the Coast-to-Coast broadcast interview with John Lear, where he fully explains the legal affidavit. http://investorstemcell.com/forum/gmans-weird-science-ufos/16799.htm Search Diigo "http://groups.diigo.com/group/socialism-and-the-end-of-the-american-dream" for "911"
Paul Merrell

US looks at ways to prevent spying on its spying - 0 views

  • (AP) — The U.S. government is looking at ways to prevent anyone from spying on its own surveillance of Americans' phone records. As the Obama administration considers shifting the collection of those records from the National Security Agency to requiring that they be stored at phone companies or elsewhere, it's quietly funding research to prevent phone company employees or eavesdroppers from seeing whom the U.S. is spying on, The Associated Press has learned. The Office of the Director of National Intelligence has paid at least five research teams across the country to develop a system for high-volume, encrypted searches of electronic records kept outside the government's possession. The project is among several ideas that would allow the government to discontinue storing Americans' phone records, but still search them as needed.
  • Under the research, U.S. data mining would be shielded by secret coding that could conceal identifying details from outsiders and even the owners of the targeted databases, according to public documents obtained by The Associated Press and AP interviews with researchers, corporate executives and government officials.
  • Internal documents describing the Security and Privacy Assurance Research project do not cite the NSA or its phone surveillance program. But if the project were to prove successful, its encrypted search technology could pave the way for the government to shift storage of the records from NSA computers to either phone companies or a third-party organization. A DNI spokesman, Michael Birmingham, confirmed that the research was relevant to the NSA's phone records program. He cited "interest throughout the intelligence community" but cautioned that it may be some time before the technology is used. The intelligence director's office is by law exempt from disclosing detailed budget figures, so it's unclear how much money the government has spent on the SPAR project, which is overseen by the DNI's Intelligence Advanced Research Projects Activity office. Birmingham said the research is aimed for use in a "situation where a large sensitive data set is held by one party which another seeks to query, preserving privacy and enforcing access policies."
  • ...3 more annotations...
  • A Columbia University computer sciences expert who heads one of the DNI-funded teams, Steven M. Bellovin, estimates the government could start conducting encrypted searches within the next year or two. "If the NSA wanted to deploy something like this it would take one to two years to get the hardware and software in place to start collecting data this way either from phone companies or whatever other entity they decide on," said Bellovin, who is also a former chief technologist for the Federal Trade Commission.
  • An encrypted search system would permit the NSA to shift storage of phone records to either phone providers or a third party, and conduct secure searches remotely through their databases. The coding could shield both the extracted metadata and identities of those conducting the searches, Bellovin said. The government could use encrypted searches to ensure its analysts were not leaking information or abusing anyone's privacy during their data searches. And the technique could also be used by the NSA to securely search out and retrieve Internet metadata, such as emails and other electronic records. Some computer science experts are less sanguine about the prospects for encrypted search techniques. Searches could bog down because of the encryption computations needed, said Daniel Weitzner, principal research scientist at MIT's Computer Science and Artificial Intelligence Laboratory and former deputy U.S. chief technology officer for the Obama administration. "There's no silver bullet that guarantees the intelligence community will only have access to the records they're supposed to have access to," Weitzner said. "We also need oversight of the actual use of the data."
  • The encrypted search techniques could make it more difficult for hackers to access the phone records and could prevent phone companies from knowing which records the government was searching. "It would remove one of the big objections to having the phone companies hold the data," Bellovin said. Similar research is underway by researchers at University of California at Irvine; a group from the University of Wisconsin-Madison and the University of Texas at Austin; another group from MIT, Yale and Rensselaer Polytechnic Institute; and a fourth from Stealth Software Technologies, a Los Angeles-based technology company.
Paul Merrell

Nuke option necessary in case of massive cyberwar, report concludes - Stripes - Indepen... - 0 views

  • The United States should be prepared to use every military option, including nuclear retaliation, in response to a huge computer attack, an independent Department of Defense task force said. But the nation must determine whether its nuclear arsenal can withstand computer hackers, the Defense Science Board warns in a newly declassified report obtained by the Tribune-Review. In a full-scale cyber war, the board's experts say, the United States' weapons could be disabled or turned against its troops. "It would have to be extreme," Paul Kaminski, chair of the Science Board and a member of the President's Intelligence Advisory Board, said about the kind of attack that might trigger a nuclear response. "It would have to be the kind of attack that we would judge would be threatening our survival." The United States must assume that computer attacks will be part of conflicts, said the report from the task force made up of civilian experts with government advisers. Yet, the report said the country cannot be confident that its military's computer systems would still work under attack from a sophisticated adversary nation with a full range of military and intelligence options.
  • Some steps to increase computer defenses could be done "relatively inexpensively," said Brian Hughes, the Science Board's executive director. The report suggests the military segregate some weapons - such as 20 bombers out of a fleet of hundreds - from integrated computer networks. The planes would lose some capability but remain operational if a computer attack grounded the rest of the fleet. Other proposals include adding to the number of "cyber warriors," which Defense plans to do, and spending more time playing war games with launching and defending computer attacks. The military must be ready to launch potentially hundreds of simultaneous, synchronized computer attacks even as it defends against them.
  •  
    So much for the Open Web. R.I.P.
Paul Merrell

Small independent news outlets have outsized impact - Mondoweiss - 0 views

  • This week, a groundbreaking article in Science proves that a better way to secure a media system that works for democracy is to strengthen independent news outlets. The five-year long study published this week in Science, directed by Harvard Professor Gary King, shows that even small independent news outlets can have a dramatic effect on the content of national conversation.  King, along with his now former graduate students Ben Schneer and Ariel White, found that if just three outlets write about a particular major national policy topic – such as jobs, the environment or immigration – discussion of that topic across social media rose by as much as 62.7 percent of a day’s volume, distributed over the week.
Gary Edwards

THE TRUTH ABOUT SPYING: The Feds Are Intercepting Your Internet Data And Tech Giants Kn... - 0 views

  • Last year James Bamford of Wired — who wrote the book "The Shadow Factory: The NSA from 9/11 to the Eavesdropping on America" — reported that the NSA hired secretive companies linked to Israeli intelligence to establish 10 to 20 wiretapping rooms at key Internet Service Provider (ISP) telecommunication points throughout the country.
  • In 2004 AT&T engineer Mark Klein discovered that a special NSA network actively "vacuumed up Internet and phone-call data from ordinary Americans with the cooperation of AT&T," emphasizing that "much of the data sent through AT&T to the NSA was purely domestic."
  • Glenn Greenwald revealed that the National Security Agency (NSA) is secretly using the so-called "business records" provision of the Patriot Act to collect telephone records of millions of Americans from Verizon. Greenwald noted that "previous reporting has suggested the NSA has collected cell records from all major mobile networks," which was best illustrated by this ACLU infographic graphic illustrating how the NSA intercepts more than a billion electronic records and communications every day.
  • ...4 more annotations...
  • NSA whistleblowers William Binney and Thomas Drake corroborated Klein's assertions: Binney contends that the NSA analyzes the information "to be able to monitor what people are doing" and who they are doing it with while Drake maintains that the NSA is using Israeli-made NARUS hardware to "seize and save all personal electronic communications."
  • Eric Lichtblau and James Risen of the New York Times won a Pulitzer-Prize for this 2005 story: As part of the program approved by President Bush for domestic surveillance without warrants, the N.S.A. has gained the cooperation of American telecommunications companies to obtain backdoor access to streams of domestic and international communications, the officials said.
  • in January Google released a transparency report detailing the government's use of controversial legislation that bypasses judicial approval to access the online information of private citizens.
  • Given the fact that the CIA's recently visited tech conference to detail the Agency's vision for collecting and analyzing all of the information people put on the Internet, it would be naïve to think that American tech giants hasn't know that all their data belongs to NSA.
  •  
    Timeline for reports and whistleblower information going public about NSA world wide dragnet of information and communications.  Note that the official timeline the NSA slides depict the start of the Internet dragnet as late 2007, when the Bush Administration wrangled Microsoft as a source.  The whistleblower timeline starts in 2001 and is rolling worldwide by 2004.
Gary Edwards

Goggle Hires Obama's Campaign E-Team - America Conservative 2 Conservative - 0 views

  •  
    Looks like Florian was right after all.  Google is a front for the big Media-Federalis-Bankster-Corporatist elites. excerpt: "The hand-in-hand nature of this White House and some of the nation's biggest corporations is seen in yet another incident as Barack Obama's 2012 campaign data team is now moving from team Obama to team Google. This week, Bloomberg reported that Obama's data mining team, used to such great effect during his 2012 re-election for president, has been hired nearly wholesale to go work for Google. This may not come as such a great surprise, however, as Google's Executive Chairman, Eric Schmidt, helped organize and run Obama's re-election e-team. Schmidt "helped recruit talent, choose technology, and coach the campaign manager, Jim Messina, on the finer points of leading a large organization," Bloomberg reports. Since he came onto the national political scene, Barack Obama has campaigned like a veritable David vs Goliath with evil corporations standing in for Goliath while Obama presents himself as David loading his sling shot to do battle. But the reality is not quite that cut and dried and Google has been a big recipient of Obama's largesse. The Washington Examiner's Tim Carney points out that the administration is filled with Googleites and that President Obama and Google have a long standing love affair. Remember Obama's No. 2 tech staffer at the White House was Google's former top lobbyist-who improperly worked with active Google lobbyists on pushing polic.... Obama appointed non-registered Google lobbyist and max-Obama donor Vint Cerf to a science advisory board. Then there was the time when Google chief Schmidt is reported to have told a Google staffer to make sure that the search engine did not connect his entries to his own political donations so that it was a bit harder to find out to whom he donated campaign cash."
Gary Edwards

Obama Playing America For a Fool on Second Amendment | Tea Party - 0 views

  •  
    "In pursing this political agenda, Obama will certainly neglect credible and important research demonstrating the psycho-active drugs being prescribed wholesale by psychiatrists in the nation's public schools cause suicidal tendencies and violent behavior by the underage children who are forced to take these drugs. Writing in Ethical Human Sciences and Services, a peer-reviewed scholarly journal, in 2003, Dr. Peter R. Breggin, a Harvard-trained psychiatrist and former full-time consultant at the National Institute of Mental Health, concluded SSRI drugs (Selective Serotonin Re-uptake Inhibitors) could relate in suicide, violence, and other forms of extreme abnormal behavior, as evidenced in case reports, controlled clinical trials, and epidemiological studies in children and adults. Readers are invited to examine a long list of school-related violent incidents that are fully documented to be related to psychoactive medications that psychiatrists and other medical doctors have prescribed for children in schools. The evidence that Dr. Breggin is right is overwhelming, even though the scientific research proving drugs cause violence is completely ignored in the politically motivated gun law debate the White House is pushing on the American people. Obama and the Democrats will never consider that school shooters themselves are the victims of teacher union-imposed social control measures that depend on dispensing these drugs without any appreciation of the risk." ................ Incredible list of psychoactive medications responsible for violent shootings and mass murder:   http://ssristories.com/index.php
Paul Merrell

Lawmaker Says There More To NSA Spying - Business Insider - 0 views

  • A House Democrat said information revealed about the National Security Agency's secret surveillance programs are "the tip of the iceberg," Daniel Strauss of The Hill reports. "I think it's just broader than most people even realize, and I think that's, in one way, what astounded most of us, too," Rep. Loretta Sanchez (D-Calif.) told C-SPAN's "Washington Journal" after a classified briefing with national security officials. Rep. Joe Barton (R-Texas), who also attended the meeting, said that the NSA "violated the spirit of the law when it started collecting data from everyone in the country just because technology now makes that possible.” Barton added that "in America ... You don’t target everyone and violate their 4th Amendment rights just because of a handful of threats. But that is exactly what is happening at the NSA ... it is wrong and it needs to stop now.” More from Sanchez: "I don't know if there are other leaks, if there's more information somewhere, if somebody else is going to step up, but I will tell you that I believe it's the tip of the iceberg."
  • A House Democrat said information revealed about the National Security Agency's secret surveillance programs are "the tip of the iceberg," Daniel Strauss of The Hill reports. "I think it's just broader than most people even realize, and I think that's, in one way, what astounded most of us, too," Rep. Loretta Sanchez (D-Calif.) told C-SPAN's "Washington Journal" after a classified briefing with national security officials. Rep. Joe Barton (R-Texas), who also attended the meeting, said that the NSA "violated the spirit of the law when it started collecting data from everyone in the country just because technology now makes that possible.” Barton added that "in America ... You don’t target everyone and violate their 4th Amendment rights just because of a handful of threats. But that is exactly what is happening at the NSA ... it is wrong and it needs to stop now.”
  • Glenn Greenwald of the Guardian, who has served as a conduit for Snowden's leaks, recently said that there will me many more "significant revelations that have not yet been heard." Greenwald told The New York Times that he received “thousands” of classified documents — “dozens” of which are newsworthy — from the the 29-year-old ex-Booz Allen employee who was contracted by the NSA. Sanchez said that what lawmakers learned "is significantly more than what is out in the media today," which is interesting when considering previous reports by journalists and whistleblowers.
  • ...2 more annotations...
  • Here's a rundown of the reports and the allegations: In 2006 NSA insiders told Leslie Cauley of USA Today that the NSA has been collecting almost all U.S. phone records since shortly after 9/11. In 2010 Dana Priest and William Arkin of The Washington Post reported that "collection systems at the [NSA] intercept and store 1.7 billion emails, phone calls, and other types of communications" every day. According to a 2007 lawsuit, Verizon built a fiber optic cable to give the "access to all communications flowing through the carrier’s operations center." In April 2012 Wired's James Bamford reported how the U.S. government hired two secretive Israeli companies to wiretap AT&T. AT&T engineer Mark Klein discovered the "secret room" at AT&T central office in San Francisco, through which the NSA actively "vacuumed up Internet and phone-call data from ordinary Americans with the cooperation of AT&T" through the wiretapping rooms, emphasizing that "much of the data sent through AT&T to the NSA was purely domestic." Former NSA executive and whistleblower Thomas Drake testified that the NSA is using Israeli-made hardware to "seize and save all personal electronic communications."
  • A classified program called Prism, leaked by Snowden, appears to acquire information from the servers of nine of the biggest internet companies. The Washington Post reported that the government's orders "serve as one-time blanket approvals for data acquisition and surveillance on selected foreign targets for periods of as long as a year." NSA Whistleblower William Binney that the NSA began using the program he built (i.e. ThinThread) to use communications data for creating, in real time, profiles of nearly all Americans so that the government is "able to monitor what people are doing" and who they are doing it with. In July the Foreign Intelligence Surveillance Court (FISC), established to "hear applications for and grant orders approving electronic surveillance," found that the NSA violated the Fourth Amendment's restriction against unreasonable searches and seizures "on at least one occasion." BONUS: In March CIA Chief Technology Officer Ira "Gus" Hunt said: "It is really very nearly within our grasp to be able to compute on all human generated information." If there is "significantly more" to the NSA's domestic snooping, then we're all ears and eyes.
Paul Merrell

Scientists Challenge EPA On Claim That Fracking Doesn't Contaminate Water - 0 views

  • An independent board of scientists said Thursday the Environmental Protection Agency should clarify why it said in a landmark draft report on fracking that there is a lack of evidence of widespread impacts on water. In a much-awaited report submitted to EPA Administrator Gina McCarthy, the agency’s independent Science Advisory Board (SAB) said it was concerned about the clarity and adequacy to support “several major findings” found in a draft assessment report on fracking the EPA first published last year.
  • “The EPA did not support quantitatively its conclusion about lack of evidence for widespread, systemic impacts of hydraulic fracturing on drinking water resources, and did not clearly describe the system(s) of interest (e.g., groundwater, surface water), the scale of impacts (i.e., local or regional), nor the definitions of “systemic” and “widespread,” the report reads. The SAB report is a blow to the oil and gas industry which had backed the EPA’s draft conclusions ever since the preliminary report included the landmark statement that emboldened the industry’s position that fracking is safe. It comes just weeks after thousands of environmentalists marched ahead of the Democratic National Convention, calling for a nationwide ban on fracking. The EPA developed the draft assessment report on fracking in response to a request in 2009 from Congress, which urged the EPA to review the relationship between hydraulic fracturing and drinking water. Experts havetold ThinkProgress in the past that the study process could be the preamble to a federal fracking rule, given that the embattled Mercury Air Toxics Standard — commonly referred to as MATS — started in a similar fashion. The SAB, comprised of 30 experts, also recommended the EPA discuss “significant data limitations and uncertainties” when presenting major findings on the fracking report, a document that condenses available scientific literature and data on the potential impacts of fracturing. It furthermore said the EPA should compile toxicological information on the chemicals employed in fracturing in “a more inclusive manner,” and recognize the many stresses fracking has on surface or groundwater resources.
  • Environmental groups quickly applauded the SAB review and said they would push for the EPA to adopt the recommendations that the agency could theoretically dismiss. “By choosing politics over science, the EPA failed the public with its misleading and controversial line, dismissing fracking’s impacts on drinking water and sacrificing public health and welfare along the way,” said Hugh MacMillan, senior researcher at Food & Water Watch. “We are calling on the EPA to act quickly on the recommendations from the EPA SAB and be clear about fracking’s impacts on drinking water resources.” The final EPA report could be published as early as next year.
  •  
    When Richard Nixon created the EPA by executive order, he chose the wrong name: it should be the Environmental Puppydog Agency. Like most federal agencies, EPA was quickly captured by the same interests it is supposed to regulate. It has been in thrall to industry ever since.
Paul Merrell

Trump Plan to Gut Stream Protections Imperils Tap Water of 117 Million Americans | EWG - 0 views

  • The Trump administration is threatening to remove safeguards that protect the drinking water of more than one-third of Americans. Some 117 million people get at least some of their drinking water from small streams.[1] For 72 million people in 1,033 counties, more than half of their drinking water comes from small streams. Ensuring that their water is safe means keeping the water in these streams clean. (See map below. Click here for a more detailed interactive map.)
  • Right now, the Clean Water Act protects these streams from pollution. But this week President Trump issued an executive order directing Environmental Protection Agency Administrator Scott Pruitt to rescind or revise the Clean Water Rule, or replace it with a new rule. This critically important rule determines which streams, rivers and lakes are protected from pollution by the Clean Water Act. The rule also extends protection for millions of acres of wetlands that filter drinking water. Industry and agribusiness have been pushing for years to roll back the Clean Water Rule and protect only the biggest streams and rivers. Now they’ve found a friend in the Trump administration. Small streams are where big rivers start, and the best science confirms that dirty streams means even dirtier rivers. Millions of Americans drink water directly connected to 234,000 miles of small, potentially unprotected streams. In 21 different states, small streams provide drinking water for 1 million or more people. (See chart below.) More than 5 million people in each New York, Texas and Pennsylvania get drinking water from small streams, as do more than 3 million in each California, Georgia, Maryland, Ohio, North Carolina and Arizona.
  • President Trump’s executive order immediately threatens drinking water for millions of Americans, but it’s not the only threat. Dozens of lawsuits seeking to gut the Clean Water Rule have been filed by industry and agribusiness, and states catering to those interests. Congress could meddle with the Clean Water Act itself to deny protection to small streams and wetlands. The Clean Water Rule is a common-sense safeguard supported by a majority of Americans. It is supported by many cities and towns that depend on unpolluted drinking water sources and natural infrastructure like wetlands to filter pollutants and absorb floodwaters. Small businesses that rely on clean water and healthy wildlife habitats, such as craft breweries and outdoor recreation companies, also strongly support the Clean Water Rule. Undermining, weakening or rescinding this vital rule is a gift to corporate polluters and Big Ag, and a threat to public health and the environment.
Gary Edwards

Can Americans Escape the Deception? - 0 views

  •  
    I've been reading Paul Craig Roberts since high school, when i used to clip his backpage columns in NewsWeek magazine. These days, you have to go to his blog to get the truth. But what a truth it is! Incredible, forceful but presented only as PCR can do. His wake up call to America is not about Republicans or Democrats. It's about our liberty and the all out assault our government, socialist and conservatives alike, has launched on the Constitution. Amerika! This is what it comes to. It's also why i'm a libertarian. Read it and weep. Excerpt is from the 9/11 section. excerpt: In a real investigation, the 9/11 evidence would not have been illegally destroyed, and the investigation would have been conducted by experts, not by government agencies assigned a cover-up and by political hacks. The NIST report is abject nonsense. It explains nothing. It is a fabricated computer simulation of a non-event. The co-chairmen and legal counsel of the 9/11 Commission later wrote books in which they stated that information was withheld from the commission, the military lied to the commission, and the commission "was set up to fail." Yet, these astounding admissions by the leaders of the 9/11 Commission had no impact on Congress, the presstitute media, or the public. All heads were in the sand. Please, whatever you do, don't make us emotional weaklings face the facts. More than one hundred firefighters, police, first responders, and building maintenance personnel report hearing and experiencing scores of explosions in the twin towers, including powerful explosions in the sub-basements prior to the collapse of the towers. Distinguished scientists, authors of many peer-reviewed scientific papers, report finding unreacted nano-thermite in the dust from the towers, tested it for its explosive and high-heat producing ability, and reported the unequivocal results. Seventeen hundred architects and engineers have testified in a petition to Congress that the th
  •  
    For a detailed and fully referenced study of how 9-11 Commission Executive Director Philip Zelikow's conflict of interest and how he kept Commission members in the dark and sabotaged the Commission report, see http://tinyurl.com/6tdfc56
Gary Edwards

Why Bitcoin Matters | Marc Andreessen - 0 views

  • First, Bitcoin at its most fundamental level is a breakthrough in computer science – one that builds on 20 years of research into cryptographic currency, and 40 years of research in cryptography, by thousands of researchers around the world. Bitcoin is the first practical solution to a longstanding problem in computer science called the Byzantine Generals Problem. To quote from the original paper defining the B.G.P.: “[Imagine] a group of generals of the Byzantine army camped with their troops around an enemy city. Communicating only by messenger, the generals must agree upon a common battle plan. However, one or more of them may be traitors who will try to confuse the others. The problem is to find an algorithm to ensure that the loyal generals will reach agreement.” More generally, the B.G.P. poses the question of how to establish trust between otherwise unrelated parties over an untrusted network like the Internet.
  • The practical consequence of solving this problem is that Bitcoin gives us, for the first time, a way for one Internet user to transfer a unique piece of digital property to another Internet user, such that the transfer is guaranteed to be safe and secure, everyone knows that the transfer has taken place, and nobody can challenge the legitimacy of the transfer. The consequences of this breakthrough are hard to overstate. What kinds of digital property might be transferred in this way? Think about digital signatures, digital contracts, digital keys (to physical locks, or to online lockers), digital ownership of physical assets such as cars and houses, digital stocks and bonds … and digital money. All these are exchanged through a distributed network of trust that does not require or rely upon a central intermediary like a bank or broker. And all in a way where only the owner of an asset can send it, only the intended recipient can receive it, the asset can only exist in one place at a time, and everyone can validate transactions and ownership of all assets anytime they want.
  • How does this work?
  • ...5 more annotations...
  • Bitcoin is an Internet-wide distributed ledger. You buy into the ledger by purchasing one of a fixed number of slots, either with cash or by selling a product and service for Bitcoin. You sell out of the ledger by trading your Bitcoin to someone else who wants to buy into the ledger. Anyone in the world can buy into or sell out of the ledger any time they want – with no approval needed, and with no or very low fees. The Bitcoin “coins” themselves are simply slots in the ledger, analogous in some ways to seats on a stock exchange, except much more broadly applicable to real world transactions. The Bitcoin ledger is a new kind of payment system. Anyone in the world can pay anyone else in the world any amount of value of Bitcoin by simply transferring ownership of the corresponding slot in the ledger. Put value in, transfer it, the recipient gets value out, no authorization required, and in many cases, no fees. That last part is enormously important. Bitcoin is the first Internetwide payment system where transactions either happen with no fees or very low fees (down to fractions of pennies). Existing payment systems charge fees of about 2 to 3 percent – and that’s in the developed world. In lots of other places, there either are no modern payment systems or the rates are significantly higher. We’ll come back to that.
  • Bitcoin is a digital bearer instrument. It is a way to exchange money or assets between parties with no pre-existing trust: A string of numbers is sent over email or text message in the simplest case. The sender doesn’t need to know or trust the receiver or vice versa. Related, there are no chargebacks – this is the part that is literally like cash – if you have the money or the asset, you can pay with it; if you don’t, you can’t. This is brand new. This has never existed in digital form before. Bitcoin is a digital currency, whose value is based directly on two things: use of the payment system today – volume and velocity of payments running through the ledger – and speculation on future use of the payment system. This is one part that is confusing people. It’s not as much that the Bitcoin currency has some arbitrary value and then people are trading with it; it’s more that people can trade with Bitcoin (anywhere, everywhere, with no fraud and no or very low fees) and as a result it has value.
  • Why would any merchant – online or in the real world – want to accept Bitcoin as payment, given the currently small number of consumers who want to pay with it? My partner Chris Dixon recently gave this example: “Let’s say you sell electronics online. Profit margins in those businesses are usually under 5 percent, which means conventional 2.5 percent payment fees consume half the margin. That’s money that could be reinvested in the business, passed back to consumers or taxed by the government. Of all of those choices, handing 2.5 percent to banks to move bits around the Internet is the worst possible choice. Another challenge merchants have with payments is accepting international payments. If you are wondering why your favorite product or service isn’t available in your country, the answer is often payments.” In addition, merchants are highly attracted to Bitcoin because it eliminates the risk of credit card fraud. This is the form of fraud that motivates so many criminals to put so much work into stealing personal customer information and credit card numbers. Since Bitcoin is a digital bearer instrument, the receiver of a payment does not get any information from the sender that can be used to steal money from the sender in the future, either by that merchant or by a criminal who steals that information from the merchant.
  • What’s the future of Bitcoin?
  • Bitcoin is a classic network effect, a positive feedback loop. The more people who use Bitcoin, the more valuable Bitcoin is for everyone who uses it, and the higher the incentive for the next user to start using the technology. Bitcoin shares this network effect property with the telephone system, the web, and popular Internet services like eBay and Facebook. In fact, Bitcoin is a four-sided network effect. There are four constituencies that participate in expanding the value of Bitcoin as a consequence of their own self-interested participation. Those constituencies are (1) consumers who pay with Bitcoin, (2) merchants who accept Bitcoin, (3) “miners” who run the computers that process and validate all the transactions and enable the distributed trust network to exist, and (4) developers and entrepreneurs who are building new products and services with and on top of Bitcoin. All four sides of the network effect are playing a valuable part in expanding the value of the overall system, but the fourth is particularly important.
  •  
    WOW! This is the must read article of the year. Great explanation of Bitcoin; what it is, how it works, and why it is so significant. Excellent analysis!
1 - 20 of 109 Next › Last »
Showing 20 items per page