| |
Current Topic: Politics and Law |
|
Topic: Politics and Law |
9:01 pm EDT, May 11, 2008 |
Nineteen sixty-eight was one exciting moment in a much larger movement. It spawned a whole range of movements. There wouldn't have been an international global solidarity movement, for instance, without the events of 1968. It was enormous, in terms of human rights, ethnic rights, a concern for the environment, too.nullnullnull
Noam Chomsky on 1968 |
|
Life and Death Are Wearing Me Out |
|
|
Topic: Politics and Law |
10:52 am EDT, May 4, 2008 |
In the summer of 1976, as Chairman Mao lay on his deathbed in Beijing, the pigs at the Ximen Village Production Brigade Apricot Garden Pig Farm in Gaomi County, Shandong Province, also began to die. The first batch of five were found with “their skin dotted with purple splotches the size of bronze coins, their eyes open, as if they’d died with unresolved grievances.” The commune vet declared they had succumbed to “what we call the Red Death” and ordered them to be cremated and buried immediately. But it had been raining for weeks and the ground was too waterlogged. Dousing the carcasses with kerosene and trying to set them alight simply filled the farm with vile-smelling smoke. Soon 800 more pigs were infected. A fresh team of vets arrived by motorboat with more sophisticated medicines, but their ministrations were of little help. Dead pigs were piled up throughout the farm, their bloated forms expanding and exploding in the heat.
Life and Death Are Wearing Me Out |
|
State of the Union Sentence Bars |
|
|
Topic: Politics and Law |
10:52 am EDT, May 4, 2008 |
As I pointed out in my last post, Directed Sentence Drawings generated from a text make it extremely difficult to see in what order the various topics were discussed and that a simple bar for each sentence in the order they occurred in the text and coloured by topic would be much better in most respects. I've built a graphic to show what I mean. I have also added the most frequent topic words for each set of 10 consecutive sentences.
State of the Union Sentence Bars |
|
Listening to Iraq | The American Prospect |
|
|
Topic: Politics and Law |
10:52 am EDT, May 4, 2008 |
The news coverage of the Iraq War almost always ignores the daily lives of ordinary Iraqis. Seeking out those personal stories could help us understand the war's human cost.
Listening to Iraq | The American Prospect |
|
Topic: Politics and Law |
10:51 am EDT, May 4, 2008 |
A total of 2,208 intercepts authorized by federal and state courts were completed in 2007, an increase of 20 percent compared to the number terminated in 2006. The number of applications for orders by federal authorities fell less than 1 percent to 457. The number of applications reported by state prosecuting officials grew 27 percent to 1,751, with 24 states providing reports, 1 more than in 2006. Installed wiretaps were in operation an average of 44 days per wiretap in 2007, compared to 40 days in 2006. The average number of persons whose communications were intercepted decreased from 122 per wiretap order in 2006 to 94 per wiretap order in 2007. The average percentage of intercepted communications that were incriminating was 30 percent in 2007, compared to 20 percent in 2006.
Full Report .2007 Wiretap Report |
|
Companies May Be Held Liable for Deals With Terrorists, ID Thieves |
|
|
Topic: Politics and Law |
6:01 am EDT, May 2, 2008 |
If you're a security pro, you might be familiar with the U.S. Treasury Department's Office of Foreign Asset Control (OFAC) requirements, which basically require companies to check their customers' identities against a list of known terrorists to prevent them from unwittingly providing products or services to an enemy. Most major credit bureaus check customers and applicants against these lists, so if you're vetting your partners and customers that way, you're probably covered. However, you may not have heard yet about the Federal Trade Commission's "Red Flag" program, which is designed to warn companies when they are about to do business with identity thieves or money-laundering operations. The Red Flag program, which takes effect Nov. 1, requires enterprises to check their customers and suppliers against databases of known online criminals -- much like what OFAC does with terrorists -- and also carries potential fines and penalties for businesses that don't do their due diligence before making a major transaction. "The final rules require each financial institution and creditor that holds any consumer account, or other account for which there is a reasonably foreseeable risk of identity theft, to develop and implement an Identity Theft Prevention Program for combating identity theft in connection with new and existing accounts," the FTC says in the rules, which were passed last year.
Companies May Be Held Liable for Deals With Terrorists, ID Thieves |
|
Virginia Postrel, on Prattling |
|
|
Topic: Politics and Law |
6:44 am EDT, Apr 28, 2008 |
Virginia Postrel writing at Dynamist.com: It's infuriating how all three presidential candidates prattle on about the need to fight global warming while also complaining about the high price of gasoline. The candidates treat CO2 emissions as a social issue like gay marriage, with no economic ramifications. In the real world, barring a massive buildup of nuclear plants, reducing carbon dioxide emissions means consuming less energy and that means raising prices a lot, either directly with a tax or indirectly with a cap-and-trade permitting system. (Alternatively, the government could just ration energy, but fortunately we aren't going in that direction.) The last thing you'd want to do is reduce gas taxes during the summer, as John McCain has proposed. That would just encourage people to burn more gas on extra vacation trips – as any straight talker would admit.
Virginia Postrel, on Prattling |
|
Medicare’s Bad News: Is Anyone Listening? |
|
|
Topic: Politics and Law |
9:10 pm EDT, Apr 25, 2008 |
Medicare is in serious fiscal trouble, but no one seems to be paying attention. The Medicare trustees recently issued their annual report, and the news is not good. If current trends continue, Medicare’s Hospital Insurance (HI) trust fund will be depleted in 2019. To make good on the health care benefits promised to Americans, future generations face a tax bill of $85 trillion (measured in today’s dollars). That makes the mortgage bailout, which is unlikely to cost more than $1 trillion, look like chicken feed. Why are we ignoring a calamity that will affect every American? What can we do to avoid fiscal disaster?
Ante up. Medicare’s Bad News: Is Anyone Listening? |
|
Data Mining and Homeland Security: An Overview |
|
|
Topic: Politics and Law |
6:57 am EDT, Apr 23, 2008 |
Previously recommended on December 29, this report was updated on April 3, 2008. Data mining has become one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. In the context of homeland security, data mining can be a potential means to identify terrorist activities, such as money transfers and communications, and to identify and track individual terrorists themselves, such as through travel and immigration records. While data mining represents a significant advance in the type of analytical tools currently available, there are limitations to its capability. One limitation is that although data mining can help reveal patterns and relationships, it does not tell the user the value or significance of these patterns. These types of determinations must be made by the user. A second limitation is that while data mining can identify connections between behaviors and/or variables, it does not necessarily identify a causal relationship. Successful data mining still requires skilled technical and analytical specialists who can structure the analysis and interpret the output. Data mining is becoming increasingly common in both the private and public sectors. Industries such as banking, insurance, medicine, and retailing commonly use data mining to reduce costs, enhance research, and increase sales. In the public sector, data mining applications initially were used as a means to detect fraud and waste, but have grown to also be used for purposes such as measuring and improving program performance. However, some of the homeland security data mining applications represent a significant expansion in the quantity and scope of data to be analyzed. Some efforts that have attracted a higher level of congressional interest include the Terrorism Information Awareness (TIA) project (now-discontinued) and the Computer-Assisted Passenger Prescreening System II (CAPPS II) project (now- canceled and replaced by Secure Flight). Other initiatives that have been the subject of congressional interest include the Multi-State Anti-Terrorism Information Exchange (MATRIX), the Able Danger program, the Automated Targeting System (ATS), and data collection and analysis projects being conducted by the National Security Agency (NSA). As with other aspects of data mining, while technological capabilities are important, there are other implementation and oversight issues that can influence the success of a project’s outcome. One issue is data quality, which refers to the accuracy and completeness of the data being analyzed. A second issue is the interoperability of the data mining software and databases being used by different agencies. A third issue is mission creep, or the use of data for purposes other than for which the data were originally collected. A fourth issue is privacy. Questions that may be considered include the degree to which government agencies should use and mix commercial data with government data, whether data sources are being used for purposes other than those for which they were originally designed, and possible application of the Privacy Act to these initiatives. It is anticipated that congressional oversight of data mining projects will grow as data mining efforts continue to evolve. This report will be updated as events warrant.
Data Mining and Homeland Security: An Overview |
|
2008-2009 Presidential Transition: National Security Considerations and Options |
|
|
Topic: Politics and Law |
6:56 am EDT, Apr 23, 2008 |
A presidential transition is a unique time in America and holds the promise of opportunity, as well as a possible risk to the nation’s security interests. The 2008- 2009 election marks the first presidential transition in the post-9/11 era, and is of concern to many national security observers. While changes in administration during U.S. involvement in national security related activities are not unique to the 2008- 2009 election, many observers suggest that the current security climate and recent acts of terrorism by individuals wishing to influence national elections and change foreign policies portend a time of increased risk to the current presidential transition period. Whether the enemies of the United States choose to undertake action that may harm the nation’s security interests during the 2008-2009 election, or the new President experiences a relatively peaceful period during the transition, many foreign and domestic policy and security challenges will await the new Administration. How the new President recognizes and responds to these challenges will depend heavily on the planning and learning that occurs prior to the inauguration. Actions can be taken by the outgoing President and President-elect that may ameliorate decision- making activities in the new administration. Whether an incident of national security significance occurs just before or soon after the presidential transition, the actions or inactions of the outgoing Administration may have a long-lasting effect on the new President’s ability to effectively safeguard U.S. interests and may affect the legacy of the outgoing President. This report discusses historical national-security related presidential transition activities, provides a representative sampling of national security issues the next administration may encounter, and offers considerations and options relevant to each of the five phases of the presidential transition period. Each phase has distinct challenges and opportunities for the incoming administration, the outgoing administration, and Congress. This report will be updated as needed.
2008-2009 Presidential Transition: National Security Considerations and Options |
|