Create an Account
username: password:
 
  MemeStreams Logo

It's always easy to manipulate people's feelings. - Laura Bush

search

Decius
Picture of Decius
Decius's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Decius's topics
Arts
  Literature
   Sci-Fi/Fantasy Literature
  Movies
   Sci-Fi/Fantasy Films
  Music
   Electronic Music
Business
  Finance & Accounting
  Tech Industry
  Telecom Industry
  Management
  Markets & Investing
Games
Health and Wellness
Home and Garden
  Parenting
Miscellaneous
  Humor
  MemeStreams
Current Events
  War on Terrorism
Recreation
  Cars and Trucks
  Travel
Local Information
  United States
   SF Bay Area
    SF Bay Area News
Science
  Biology
  History
  Math
  Nano Tech
  Physics
Society
  Economics
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
Sports
Technology
  Computer Security
  Macintosh
  Spam
  High Tech Developments

support us

Get MemeStreams Stuff!


 
"I don't think the report is true, but these crises work for those who want to make fights between people." Kulam Dastagir, 28, a bird seller in Afghanistan

REVIEW: The Dialogue in Hell Between Machiavelli and Montesquieu
Topic: Miscellaneous 10:22 pm EDT, Jul 23, 2013

Few books are more famous for what subsequent forgers do with them than for their original contents. Maurice Joly’s The Dialogue in Hell Between Machiavelli and Montesquieu, first published in Brussels in 1864, is indeed a very strange book. And its strangeness is multiple.

REVIEW: The Dialogue in Hell Between Machiavelli and Montesquieu


Wyden Speech on NSA Domestic Surveillance at Center for American Progress
Topic: Miscellaneous 2:27 pm EDT, Jul 23, 2013

Wyden's remarks at the Center for American Progress.

Wyden Speech on NSA Domestic Surveillance at Center for American Progress


APOD: 2013 July 23 - Two Views of Earth
Topic: Miscellaneous 10:25 am EDT, Jul 23, 2013

In a cross-Solar System interplanetary first, our Earth was photographed during the same day from both Mercury and Saturn. Pictured on the left, Earth is the pale blue dot just below the rings of Saturn, as captured by the robotic Cassini spacecraft now the gas giant. Pictured on the right, the Earth-Moon system is seen against a dark background, as captured by the robotic MESSENGER spacecraft now orbiting Mercury. In the MESSENGER image, the Earth (left) and Moon (right) shine brightly with reflected sunlight. MESSENGER took the overexposed image last Friday as part of a search for small natural satellites of the innermost planet, moons that would be expected to be quite dim. During this same day, humans across planet Earth snapped many of their own pictures of Saturn.

APOD: 2013 July 23 - Two Views of Earth


Twitter / _decius_: Service Provider Meta-Data Retention
Topic: Miscellaneous 8:48 pm EDT, Jul 20, 2013

Service Provider Meta-Data Retention - US: http://www.aclu.org/cell-phone-location-tracking-request-response-cell-phone-company-data-retention-chart … (years) EU: http://blogs.wsj.com/brussels/2010/08/02/exclusivedata-retention-limits-per-eu-country/ … (months)

Twitter / _decius_: Service Provider Meta-Data Retention


Mood shifting, Congress may move to limit NSA spying | McClatchy
Topic: Miscellaneous 8:44 pm EDT, Jul 20, 2013

Congress is growing increasingly wary of controversial National Security Agency domestic surveillance programs, a concern likely to erupt during legislative debate _ and perhaps prod legislative action _ as early as next week.

Mood shifting, Congress may move to limit NSA spying | McClatchy


The Volokh Conspiracy » Intelligence Under Law — Judiciary Testimony
Topic: Miscellaneous 5:42 pm EDT, Jul 17, 2013

My reply to Stewart Baker's Congressional Testimony:

Suffice it to say that I think that a model that says "collect everything, and let agents analyze it without individualized suspicion, but try to flag questionable searches" is a radical departure from our current approach, which requires justification before collection, and it is also a radical departure from a model that says "collect everything, but require individualized suspicion before analysis."

I don't agree with your assertion that "the risk of rule-breaking is pretty much the same whether the collection comes first or second." If the collection comes first, the data is there to be abused and the risk that it might be abused exists as long as it is there. For example, if the data is stored for 5 years, than at any point in that 5 year period of time an agent decides to make an abusive query, the data will be there waiting for him.

However, if collection comes second, then the data isn't there. It disappears the minute the phone company decides that it is no longer needed for their purposes, and at that point, the risk that it will be abused is over. Any new data created after the point that the agent decides to do something abusive will be available, but the old data will not be. Therefore, the risk to an individual person is significantly lower, and individual people can make real time risk assessments regarding the situation going forward.

For example, lets say you phone Martin Luther King because you support his views on civil rights. Two years later, King makes a public statement opposing a war in Vietnam. At that time, it occurs to you that the military might target King and his associates because King is an influential person who opposes a war that the military wants to get into and they want to shut him up and they want to shut up anyone he might have influenced.

In the collect first scenario, you have to wait for five years after that phone call before you no longer have to worry that the military will find out that you associated with King and target you personally for having done so. In the collect second scenario, you only have to wait six months, or a year at most, until the phone company destroys the data.

The total risk to you in associating with King is significantly reduced the second scenario. Therefore, your likelihood of feeling free to associate with King is significantly greater. Furthermore, if at some point King does something that might make him the target of an illegal government crackdown, you can choose at that point to stop associating with him if thats what you want to do, without having to worry about all of your past associations being exposed.

In other words, the collect first model places a significant chill upon your exercise of your right to freedom of association, because if you ever associate with anyone who later does something that makes him a target of a illegal government crackdown, you could be targeted as well. In the collect first society, you're best off avoiding contact with anyone that might, in the future, be considered an enemy of the state. In the collect second society we don't have to go around worrying about that kind of thing, because, you know, we live in a free society.

The Volokh Conspiracy » Intelligence Under Law — Judiciary Testimony


Keep chipping away at NSA secrecy
Topic: Miscellaneous 4:23 pm EDT, Jul 17, 2013

None of these has gotten much ink, and what continues to remain striking is that, for all the intense media attention to the NSA story, almost no attention has been given to efforts such as these that would actually do something about the problem, or at least one important dimension of the problem. There is not nearly enough media coverage of the various policy fixes that would begin to correct an aspect of this that everyone should agree is problematic, no matter what people think of the NSA programs themselves — the secrecy that shrouds their legal rationales.

Keep chipping away at NSA secrecy


EXCLUSIVE: "Guidebook to False Confessions": Key Document John Yoo Used to Draft Torture Memo Released
Topic: Miscellaneous 1:46 pm EDT, Jul 10, 2013

Air Force Col. Steven Kleinman, a career military intelligence officer recognized as one of the DOD's most effective interrogators as well a former SERE instructor and director of intelligence for JPRA's teaching academy, said he immediately knew the true value of the PREAL manual if employed as part of an interrogation program.

"This is the guidebook to getting false confessions, a system drawn specifically from the communist interrogation model that was used to generate propaganda rather than intelligence," Kleinman said in an interview. "If your goal is to obtain useful and reliable information this is not the source book you should be using."

EXCLUSIVE: "Guidebook to False Confessions": Key Document John Yoo Used to Draft Torture Memo Released


The Torture That Underlies FISA Court’s “Special Needs” Decisions | emptywheel
Topic: Miscellaneous 1:34 pm EDT, Jul 10, 2013

Brennan admits that in affirmations to the FISC relating to the continuation of “certain programs” — that is, the “scary memos” — he relied on information from the CIA’s torture program.

The one that was designed to elicit false confessions from the start.

John Brennan’s admission sure seems to indicate that that original dragnet opinion, the one the others have built on, relies on the unreliable information elicited by CIA torture.

The Torture That Underlies FISA Court’s “Special Needs” Decisions | emptywheel


Could the Supreme Court stop the NSA?
Topic: Miscellaneous 12:31 pm EDT, Jul 10, 2013

The Supreme Court has the power to issue an order called a “writ of mandamus” to deal with lower courts that overstep their legal authority. This type of order is only supposed to be used in “exceptional circumstances.” But EPIC argues that the NSA’s phone records program is exactly the kind of situation that merits the Supreme Court’s intervention.

Could the Supreme Court stop the NSA?


(Last) Newer << 11 ++ 21 - 22 - 23 - 24 - 25 - 26 - 27 - 28 - 29 ++ 39 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0