He called his method "planning for permanence," for his objective was to
"develop whole residential neighborhoods that would attract an element
of people who desired a better way of life, a nicer place to live and
would be willing to work in order to keep it better." Nichols invented
the percentage lease, where rents are based on tenants' gross receipts.
The percentage lease is now a standard practice in commercial leasing
across the United States. Nichols was prominent in Kansas City civic
life, being involved in the creation of the Liberty Memorial, Nelson-Atkins Museum of Art, the Midwest Research Institute, as well as the development of Kansas City University, now the University of Missouri-Kansas City. His philosophies about city planning greatly influenced other developments in the United States, including Beverly Hills and the Westwood neighborhood of Los Angeles, as well as Shaker Heights, Ohio.
Modern outdoor shopping centers, now common in the United States, share
a common ancestor in the Country Club Plaza, which opened in Kansas
City in 1923. The Urban Land Institute's J. C. Nichols Prize for Visionaries in Urban Development[1] is named for him. Moreover, the New Urbanists, developers who design to combat suburban sprawl, look to the Country Club District as a model for modern developments.
J.C. Nichols relied on restrictive covenants
to control the uses of the lands in the neighborhoods he developed.
Most of the covenants restricted the lands to residential uses, and
contained other features such as setback and free space requirements.
However, homes in the Country Club District were restricted with
covenants that prohibited African Americans and Jews from owning or
occupying the homes, unless they were servants. Nichols did not invent
the practice, but he used it to effectively bar ethnic minorities from
living in his properties during the first half of the century. His
restrictive covenant model was later adopted by the federal government
to help implement similar policies in other regions of the United
States. Ultimately, the 1948 Supreme Court decision Shelley v. Kraemer
made such covenants unenforceable. Nevertheless, covenants remained on
the deeds to properties developed by J.C. Nichols for decades after the
Supreme Court decision because of the practical difficulty of changing
them. (The deed restrictions in most neighborhoods renew automatically
every twenty to twenty-five years unless a majority of the homeowners
agree to change them with notarized votes.) In 2005, Missouri passed a
law allowing the governing bodies of homeowner's associations to delete
restrictive covenants from deed restrictions without a vote of the
members. To this day, the Country Club District is predominantly white,
and it is among the wealthiest, most sought-after neighborhoods in the
United States, and has still been plagued with numerous accusations of
racial profiling against minorities by police and security officers in
the area.
When I was a boy, my parents took me to an address given at Century II auditorium by the late great New York congresswoman Shirley Chisholm. I remember that lecture because the Hon.Sis.Congresswoman was a riveting, direct, and powerful voice - competent and wise in a way that hasn't been observed on the American political scene for quite some time. I haven't heard her kind of intelligent, wise, and compassionate political discourse in a very long time, until lately that is.....,
I have been reading the DOJ
website for years and have a different perspective. It is true that
President Obama has deported more people than any prior president and
audited more businesses. But, in Texas, that meant jobs for black
people that were previously held by illegal aliens. http://www.ice.gov/gcse-result...
When you deport nearly 400,000 a year, some jobs are going to open
up. When you send the employers to jail and levy fines--they get the
message. Most of the positive changes have come through the Justice
Department as congress is not willing to cooperate. http://www.justice.gov/opa/pr/... & http://searchjustice.usdoj.gov...
The financial collapse was caused mostly by mortgage fraud. For many
years there were warnings that over 60% of mortgages were for investment
property. In the past, investors bought property for cash at auctions,
rehabbed them and put them up for sale or rent. Because government
housing vouchers allowed the residents getting them to live anywhere
that passed inspection--people got the idea of taking out mortgages on
homes (sometimes in bulk) and paying the mortgages with money from the
government. But, a funny thing happened on the way to the forum. Mixed
in the neighborhood with the working poor who just wanted a decent
home, were the thuggies. The thuggies who often find shelter with
lonely desperate women, trashed the homes and ran others from the
neighborhoods. Other people lied on their loan applications, hoping to
make money as real estate prices rose. Still others committed
deliberate fraud with the help of apraisers and mortgage brokers. Then
those investment were sold. http://www.youtube.com/watch?v...
And the banks were caught with a lot of bad debt. Most people don't
realize that AIG insured those gambles. Even people who didn't own the
investments could insure them. Everybody panicked on the way down.
I
was looking at a bank stock, when my husband bought me my weekly copy of
Barrons.(before Murdock) Their roundtable said GET OUT OF THE STOCK
MARKET! I told my husband, but he hesitated until he saw the losses on
his 401K statement. I found 14 stocks that didn't lose money and paid
their dividends during the meltdown. I also took a chance on corporate
debt at Barron's advice. But, after a while, my hubbie got nervous and
asked me to cash out. I saw Apple at $6.00 a share and was just getting
ready to push the buy button with an option to continue to buy at that
price when my husband told me he didn't want to lose $600.00. In the
intervening time, I realized that you could actually make money during
bad times if you don't have a lot of money to invest. And I still have
the stock I bought at $0.16 a share which is today at $3.87 a share. So
what is my point? My point is...instead of bemoaning Wall
Street--learn how to work it to your advantage. I can trade for $4.95 a
trade and $0.65 a contract + $4.95 for options. I have bought my
daughter money on investing and given her money to save for the day she
starts to trade for herself. The lie continues to circulate that no one
was prosecuted in the mortgage mess. http://www.justice.gov/usao/md...
It doesn't bother me that the President went to Columbia and Harvard
or that he was a professor. I heard a union for the workers who make
auto parts that whenever they had a complaint about Chinese imports
breaking trade or intellectual property laws, the Whitehouse was on
their side.
A lot of what ailes black America is the negative attitude of many of
our sisters as they feel that they are "outsiders". Many have felt
angry at being part of what they see as a permanent hated subculture
that they can't escape. What has been the result--they allow themselves
to be used and abused and Amen every immoral thing a black man does.
Now, I see them proud and starting to fight back.
Presidents come and presidents go, but whatever one might think of
the President and he is the President of the United States with Congress
making the rules....he and his wife have instilled pride in many of our
people who didn't have it before. Although some people may not like
it, he has shown many people of foreign origin that black people in this
country, do count and are not the hated permanent underclass the media
led everyone to believe.
Our economy is, as it has been for many years, on the brink of
collapse. They may not have announced it officially just yet, but recent
data suggest that we are most certainly in another recession (we may
never have actually gotten out of the first one). While official
statistics indicate there is very mild economic growth, the fact is that
the growth is coming from monetary expansion driven by the Fed. As more
money is slammed into the system prices rise, forcing consumers to pay
more for everything from food to stocks. This, in the eyes of the
government is growth. In reality, however 55% of America’s wealth has been vaporized in the last five years, a quarter of American households are on food stamps, and consumers are tapped out.
On the political front, we have the President of the United States,
his administration and his subordinates at domestic intelligence
agencies, the IRS, the Pentagon and the Justice Department embroiled in
scandals and activities that have even their most ardent supporters
questioning what is really going on behind closed doors.
Yes, something is wrong. But no one is talking – at least not in an official capacity.
Thus, we are left to connect the dots ourselves with the help of various sources made available through alternative media.
We certainly can’t expect government officials to openly admit that
some very bad things have happened, are happening and will likely happen
in the future. But there are those inside the halls of our most
hallowed and respected institutions that risk their lives to get
information out so that we can be prepared for what may well be coming
down the pike.
We can downplay anonymous sources and pretend like this is all made
up, or, we can simply look around and see what’s going on in the world
and put two-and-two together.
technologyreview | Given his calm and reasoned academic demeanor, it is
easy to miss just how provocative Erik Brynjolfsson’s contention really
is. Brynjolfsson, a professor at the MIT Sloan School of Management,
and his collaborator and coauthor Andrew McAfee have been arguing for
the last year and a half that impressive advances in computer
technology—from improved industrial robotics to automated translation
services—are largely behind the sluggish employment growth of the last
10 to 15 years. Even more ominous for workers, the MIT academics foresee
dismal prospects for many types of jobs as these powerful new
technologies are increasingly adopted not only in manufacturing,
clerical, and retail work but in professions such as law, financial
services, education, and medicine.
That robots, automation, and
software can replace people might seem obvious to anyone who’s worked in
automotive manufacturing or as a travel agent. But Brynjolfsson and
McAfee’s claim is more troubling and controversial. They believe that
rapid technological change has been destroying jobs faster than it is
creating them, contributing to the stagnation of median income and the
growth of inequality in the United States. And, they suspect, something
similar is happening in other technologically advanced countries.
Perhaps
the most damning piece of evidence, according to Brynjolfsson, is a
chart that only an economist could love. In economics, productivity—the
amount of economic value created for a given unit of input, such as an
hour of labor—is a crucial indicator of growth and wealth creation. It
is a measure of progress. On the chart Brynjolfsson likes to show,
separate lines represent productivity and total employment in the United
States. For years after World War II, the two lines closely tracked
each other, with increases in jobs corresponding to increases in
productivity. The pattern is clear: as businesses generated more value
from their workers, the country as a whole became richer, which fueled
more economic activity and created even more jobs. Then, beginning in
2000, the lines diverge; productivity continues to rise robustly, but
employment suddenly wilts. By 2011, a significant gap appears between
the two lines, showing economic growth with no parallel increase in job
creation. Brynjolfsson and McAfee call it the “great decoupling.” And
Brynjolfsson says he is confident that technology is behind both the
healthy growth in productivity and the weak growth in jobs.
NYTimes | Slowly, and largely under the radar, a growing number of local law
enforcement agencies across the country have moved into what had
previously been the domain of the F.B.I. and state crime labs — amassing
their own DNA databases of potential suspects, some collected with the
donors’ knowledge, and some without it.
And that trend — coming at a time of heightened privacy concerns after
recent revelations of secret federal surveillance of telephone calls and
Internet traffic — is expected only to accelerate after the Supreme
Court’s recent decision upholding a Maryland statute allowing the
authorities to collect DNA samples from those arrested for serious
crimes.
These local databases operate under their own rules, providing the
police much more leeway than state and federal regulations. And the
police sometimes collect samples from far more than those convicted of
or arrested for serious offenses — in some cases, innocent victims of
crimes who do not necessarily realize their DNA will be saved for future
searches.
New York City has amassed a database with the profiles of 11,000 crime
suspects. In Orange County, Calif., the district attorney’s office has
90,000 profiles, many obtained from low-level defendants who give DNA as
part of a plea bargain or in return for having the charges against them
dropped. In Central Florida, several law enforcement agencies have
pooled their DNA databases. A Baltimore database contains DNA from more
than 3,000 homicide victims.
These law enforcement agencies are no longer content to rely solely on
the highly regulated network of state and federal DNA databases, which
have been more than two decades in the making and represent one of the
most significant developments in the history of law enforcement in this
country.
The reasons vary. Some police chiefs are frustrated with the time it can
take for state crime labs to test evidence and enter DNA profiles into
the existing databases. Others want to compile DNA profiles from
suspects or low-level offenders long before their DNA might be captured
by the state or national databases, which typically require conviction
or arrest.
“Unfortunately, what goes into the national database are mostly
reference swabs of people who are going to prison,” said Jay Whitt of
the company DNA:SI Labs, which sells DNA testing and database services
to police departments. “They’re not the ones we’re dealing with day in
day out, the ones still on the street just slipping under the radar.”
The rise in these local databases has aroused concerns among some
critics, worried about both the lax rules governing them and the privacy
issues they raise.
nydailynews | So, why is it that many Americans, including me, are so upset with the Obama administration gathering up telephone records?
My concerns are twofold. First, the law under which President George W.
Bush and now President Obama have acted was not intended to give the
government records of all telephone calls. If that had been the intent,
the law would have said that. It didn’t. Rather, the law envisioned the
administration coming to a special court on a case-by-case basis to
explain why it needed to have specific records.
I am troubled by the precedent of stretching a law on domestic
surveillance almost to the breaking point. On issues so fundamental to
our civil liberties, elected leaders should not be so needlessly
secretive.
The argument that this sweeping search must be kept secret from the
terrorists is laughable. Terrorists already assume this sort of thing is
being done. Only law-abiding American citizens were blissfully ignorant
of what their government was doing.
Secondly, we should worry about this program because government
agencies, particularly the Federal Bureau of Investigation, have a
well-established track record of overreaching, exceeding their authority
and abusing the law. The FBI has used provisions of the Patriot Act,
intended to combat terrorism, for purposes that greatly exceed
congressional intent.
Even if you trust Obama, should we have programs and interpretations of
law that others could abuse now without his knowing it or later in
another administration? Obama thought we needed to set up rules about
drones because of what the next President might do. Why does he not see
the threat from this telephone program?
If the government wanted a particular set of records, it could tell the
Foreign Intelligence Surveillance Court why — and then be granted
permission to access those records directly from specially maintained
company servers. The telephone companies would not have to know what
data were being accessed. There are no technical disadvantages to doing
it that way, although it might be more expensive.
Would we, as a nation, be willing to pay a little more for a program
designed this way, to avoid a situation in which the government keeps on
its own computers a record of every time anyone picks up a telephone?
That is a question that should have been openly asked and answered in
Congress.
The vocal advocate of civil liberties was absent because neither Bush
nor Obama had appointed one, despite the recommendation of the 9/11
Commission and a law passed by Congress. Only five years into his
administration is our supposedly civil liberties-loving President
getting around to activating a long-dormant Privacy and Civil Liberties
Oversight Board. It will have a lot of work to do.
DailyCaller |Daily Caller: What system are we talking about?
Binney: It used to be called Stellar Wind and now
it’s called Ragtime. Ragtime P is the domestic stuff. That may be a
reference to the Patriot Act Section 215.
Daily Caller: So what are they doing with all of
this information? If they can’t stop the Boston marathon bombing, what
are they doing with it?
Binney: Well again, they’re putting an extra burden
on all of their analysts. It’s not something that’s going to help them;
it’s something that’s burdensome. There are ways to do the analysis
properly, but they don’t really want the solution because if they got
it, they wouldn’t be able to keep demanding the money to solve it. I
call it their business statement, “Keep the problems going so the money
keeps flowing.” It’s all about contracts and money.
Daily Caller: But isn’t data collection getting
easier and processing speeds getting faster and data collection cheaper?
Isn’t the falling price one of the reasons they can collect data at
this massive level?
Binney: Yes, but that’s not the issue. The issue is,
can you figure out what’s important in it? And figure out the
intentions and capabilities of the people you’re monitoring? And they
are in no way prepared to do that, because that takes analysis. That’s
what the big data initiative
was all about out of the White House last year. It was to try to get
algorithms and figure out what’s important and tell the people what’s
important so that they can find things. The probability of them finding
what’s really there is low.
Daily Caller: Well if that’s where the priorities
are, should we ask if the goal really is to prevent terrorism? Or is it
to know as much as possible about Americans — at an individual level and
a society level?
Binney: That’s my point. When you ask how much
damage these leaks have done to our capability, they’ve actually done
absolutely nothing. The terrorists were monitoring all of this
information anyway, so they had a pretty good idea of what was being
collected. So, who are we keeping this from? It’s not the terrorists. We
are really keeping it from the American public. Because that’s who
they’re collecting data about. And that’s who they’re keeping it secret
from. The terrorists already knew all this stuff.
Daily Caller: How searchable is this material? Let’s say I want to use NSA material against the tea party. Could I do that?
Binney: That would be very simple. You just take the
key point “tea party,” plug it in the graph, and you get everybody.
That smacks of what they’re doing.
I was listening to the testimony of one of the tea party people
to Congress, one of the people being abused by the IRS, and she said
she was asked, “What is my relationship with this person?” And the IRS
agent gave her the name. Well, the question becomes, how did the IRS
know the relationship with that person? And one way they’d know that is
from this program, for sure.
So the question is, is someone in the White House, in the line of
command, using any access to that program to find a tea party initiative
or tea party people trying to get tax exempt status so they can pass
them along for the IRS to target? That’s a question I think the
government needs to answer, and prove that that’s not happening.
But when have they ever told you the truth from 2001 on? They only
tell you the truth when they’ve been caught or exposed. And then, they
only tell you what’s been exposed. They never go any further. Then, they
wait for the next exposure to come out. How can you believe it?
NYTimes | The director of the National Security Agency
told Congress on Wednesday that “dozens” of terrorism threats had been
halted by the agency’s huge database of the logs of nearly every
domestic phone call made by Americans, while a senator briefed on the
program disclosed that the telephone records are destroyed after five
years.
The director, Gen. Keith B. Alexander, who heads both the N.S.A. and
United States Cyber Command, which runs the military’s offensive and
defensive use of cyberweapons, told skeptical members of the Senate
Appropriations Committee that his agency was doing exactly what Congress
authorized after the attacks of Sept. 11, 2001.
General Alexander said he welcomed debate over the legal justification
for the program because “what we’re doing to protect American citizens
here is the right thing.” He said the agency “takes great pride in
protecting this nation and our civil liberties and privacy” under the
oversight of Congress and the courts.
“We aren’t trying to hide it,” he said. “We’re trying to protect
America. So we need your help in doing that. This isn’t something that’s
just N.S.A. or the administration doing it on its own. This is what our
nation expects our government to do for us.”
But in his spirited exchanges with committee members, notably Senator
Patrick J. Leahy, Democrat of Vermont, General Alexander said he was
seeking to declassify many details about the program now that they have
been leaked by Edward J. Snowden, a former N.S.A. contractor who came
forward to say he was the source of documents about the phone log
program and other classified matters.
Daily Caller: So what are they doing with all of this information? If
they can’t stop the Boston marathon bombing, what are they doing with
it?
Binney: Well again, they’re putting an extra burden on all of their
analysts. It’s not something that’s going to help them; it’s something
that’s burdensome. There are ways to do the analysis properly, but they
don’t really want the solution because if they got it, they wouldn’t be
able to keep demanding the money to solve it. I call it their business
statement, “Keep the problems going so the money keeps flowing.” It’s
all about contracts and money.
Daily Caller: But isn’t data collection getting easier and processing
speeds getting faster and data collection cheaper? Isn’t the falling
price one of the reasons they can collect data at this massive level?
Binney: Yes, but that’s not the issue. The issue is, can you figure
out what’s important in it? And figure out the intentions and
capabilities of the people you’re monitoring? And they are in no way
prepared to do that, because that takes analysis. That’s what the big data initiative
was all about out of the White House last year. It was to try to get
algorithms and figure out what’s important and tell the people what’s
important so that they can find things. The probability of them finding
what’s really there is low.
NYTimes | The comments of the Senate leaders showed a coordinated effort to squelch any legislative move to rein in the surveillance programs. Mr. Reid took the unusual step of publicly slapping back at fellow senators — including senior Democrats — who have suggested that most lawmakers have been kept in the dark about the issue.
“For senators to complain that they didn’t know this was happening, we had many, many meetings that have been both classified and unclassified that members have been invited to,” Mr. Reid said. “They shouldn’t come and say, ‘I wasn’t aware of this,’ because they’ve had every opportunity.”
Among lawmakers who have expressed concerns in the past, however, the issues have not been laid to rest. When reporters pressed Mr. Wyden on whether Mr. Clapper had lied to him, he stopped short of making that accusation, but made his discontent clear.
“The president has said — correctly, in my view — that strong Congressional oversight is absolutely essential in this area,” he said. “It’s not possible for the Congress to do the kind of vigorous oversight that the president spoke about if you can’t get straight answers.”
At the March Senate hearing, Mr. Wyden asked Mr. Clapper, “Does the N.S.A. collect any type of data at all on millions or hundreds of millions of Americans?”
“No, sir,” Mr. Clapper replied. “Not wittingly.”
Mr. Wyden said on Tuesday that he had sent his question to Mr. Clapper’s office a day before the hearing, and had given his office a chance to correct the misstatement after the hearing, but to no avail.
In an interview on Sunday with NBC News, Mr. Clapper acknowledged that his answer had been problematic, calling it “the least untruthful” answer he could give.
Michael V. Hayden, the former director of both the N.S.A. and the C.I.A., said he considered Mr. Wyden’s question unfair, given the classified subject. “There’s not another country in the world where that question would have been asked and answered in a public session,” he said.
WaPo | The closest parallel for Snowden and Manning may be Daniel Ellsberg, who in 1971 was the New York Times’ and The Washington Post’s source for the Pentagon Papers, a secret assessment of the Vietnam War that eroded the credibility of U.S. government’s more-optimistic public claims about the conflict. Ellsberg in recent days has praised Snowden and described the material Snowden disclosed as more significant than the documents he leaked four decades ago.
There are differences, however. Ellsberg was a senior military analyst working at the Pentagon who had a direct role in drafting the Pentagon Papers. The document was largely a record of U.S. decision-making rather than a blueprint of ongoing operations. Drafts were undoubtedly stored in safes, not on networks where they might be read by low-level employees at distant military or intelligence outposts.
A former senior NSA official recalled procedures in the 1970s that were archaic but secure. “When hot documents would go around they’d be in a double-sealed envelope, and some person would wait while you read it, re-
envelope it and leave,” the former official said. “By contrast, now you bring it up on your computer screen.”
Some U.S. officials question whether there is a generational gap in views on privacy and government transparency. Manning and Snowden, who are in their 20s, grew up with technology and the Internet as fixtures in their lives.
“We are recruiting Americans from a culture that has a deeper desire for absolute transparency than any previous cohort of people entering the service,” said Michael V. Hayden, former CIA and NSA director. “They are coming from a culture in which, for many, transparency is an absolute good, and it appears that in these two cases it influenced these people.”
Snowden appears to have left fewer online footprints than many of his generation, with no evidence of Facebook or Twitter accounts. In his comments to The Post, he indicated that was in part because of what he had learned.
The Internet “is a TV that watches you,” he said, a technology “governments are abusing . . . to extend their powers beyond what is necessary and appropriate.”
WaPo | Both Google and Facebook, whose business models depend on hundreds of millions of users voluntarily sharing information about themselves, have denied participating in a surveillance program as broad as described in news reports on PRISM. Yet all the companies named in reports have struggled to stanch the damage to their reputations as stewards of personal privacy.
Google on Tuesday published an open letter to Attorney General Eric H. Holder Jr. and FBI Director Robert S. Mueller III requesting the right to report publicly the numbers and scope of national security data requests, a move that would allow Google to significantly expand its semiannual “transparency reports” on the information sought by courts and police worldwide.
“Google has nothing to hide,” wrote Chief Legal Officer David Drummond. The Justice Department declined to comment.
Facebook soon after issued a statement suggesting that it may start publishing its own “transparency reports” — a move the company has long resisted. “We urge the United States government to help make that possible by allowing companies to include information about the size and scope of national security requests we receive, and look forward to publishing a report that includes that information,” wrote Ted Ullyot, general counsel to Facebook. (Washington Post Co. Chairman Donald E. Graham is on Facebook’s board.)
Microsoft issued a statement as well, saying that greater transparency “would help the community understand and debate these important issues.”
Yahoo said late Tuesday that “we recognize the importance of privacy and security, and we also believe that transparency . . . will help build public trust.”
ZDNet | Summary: A bombshell story published in the Washington Post
this week alleged that the NSA had enlisted nine tech giants, including
Microsoft, Google, Facebook, and Apple, in a massive program of online
spying. Now the story is unraveling, and the Post has quietly changed
key details. What went wrong?
NYTimes | what I cherish most about America is our open society, and I believe that if there is one more 9/11 — or worse, an attack involving nuclear material — it could lead to the end of the open society as we know it. If there were another 9/11, I fear that 99 percent of Americans would tell their members of Congress: “Do whatever you need to do to, privacy be damned, just make sure this does not happen again.” That is what I fear most.
That is why I’ll reluctantly, very reluctantly, trade off the government using data mining to look for suspicious patterns in phone numbers called and e-mail addresses — and then have to go to a judge to get a warrant to actually look at the content under guidelines set by Congress — to prevent a day where, out of fear, we give government a license to look at anyone, any e-mail, any phone call, anywhere, anytime.
So I don’t believe that Edward Snowden, the leaker of all this secret material, is some heroic whistle-blower. No, I believe Snowden is someone who needed a whistle-blower. He needed someone to challenge him with the argument that we don’t live in a world any longer where our government can protect its citizens from real, not imagined, threats without using big data — where we still have an edge — under constant judicial review. It’s not ideal. But if one more 9/11-scale attack gets through, the cost to civil liberties will be so much greater.
A hat tip to Andrew Sullivan for linking on his blog to an essay by David Simon, the creator of HBO’s “The Wire.” For me, it cuts right to the core of the issue.
“You would think that the government was listening in to the secrets of 200 million Americans from the reaction and the hyperbole being tossed about,” wrote Simon. “And you would think that rather than a legal court order, which is an inevitable consequence of legislation that we drafted and passed, something illegal had been discovered to the government’s shame. Nope. ... The only thing new here, from a legal standpoint, is the scale on which the F.B.I. and N.S.A. are apparently attempting to cull anti-terrorism leads from that data. ... I know it’s big and scary that the government wants a database of all phone calls. And it’s scary that they’re paying attention to the Internet. And it’s scary that your cellphones have GPS installed. ... The question is not should the resulting data exist. It does. ... The question is more fundamental: Is government accessing the data for the legitimate public safety needs of the society, or are they accessing it in ways that abuse individual liberties and violate personal privacy — and in a manner that is unsupervised. And to that, The Guardian and those who are wailing jeremiads about this pretend-discovery of U.S. big data collection are noticeably silent. We don’t know of any actual abuse.”
We do need to be constantly on guard for abuses. But the fact is, added Simon, that for at least the last two presidencies “this kind of data collection has been a baseline logic of an American anti-terrorism effort that is effectively asked to find the needles before they are planted into haystacks, to prevent even such modest, grass-rooted conspiracies as the Boston Marathon bombing before they occur.”
slate | As I explained earlier today, NSA whistle-blower/leaker/source Edward Snowden's decision to flee for Hong Kong doesn't look like the wisest decision given the former British colony's existing extradition treaty with the United States. But the GlobalPost's Benjamin Carlson
explains one detail that everyone seems to be overlooking: A
potential bureaucratic loophole that could buy Snowden some much-needed
time while he figures out where he'll go next.
Simon Young, director of the Centre for Comparative and
Public Law at the University of Hong Kong, told GlobalPost that a
decision delivered by Hong Kong's High Court in March of this year
required the government to create a new procedure for reviewing asylum
applications.
Until the government does this, he said, asylum seekers are
allowed to stay in Hong Kong indefinitely. "We’re still waiting to hear
from government how they are going to implement this decision," said
Young. "Until that’s the case, you can’t return anyone until the law’s
in place."
In other words, should Snowden apply for asylum, then even
if the US made a valid extradition request and Hong Kong was willing to
comply he could not be deported until the government figured out a new
way to review asylum cases — a potentially lengthy process.
Nicholas Bequelin of Human Rights Watch says that any
Snowden extradition must be "a long way off" because of this gap in the
law. "If it comes to the point where the US does issue a warrant on
Snowden, and then passes it over to the Hong Kong authorities, and he
decides to fight it, at this point it would be a court case," he told
GlobalPost. "And it can be a long court case, going up to the court of
final appeals."
It's unclear if Snowden and his allies planned to exploit this
loophole all along, although it would certainly provide the missing
rationale for why he chose to head to Hong Kong in the first place, and
why he felt comfortable enough to out himself and his (rough) location
over the weekend. Regardless, it's unlikely that he'll be resting easy
any time soon.
To have Hollywood tell it, the bare knuckles end of the machinery of state is just oh, so super bad. While at one time, say during that era in which Time Life was the Google of our world, this may indeed have been the case. But since the era in which Moore's Law has run wild, and during which the 1% have sponged up more wealth on a vaster scale than the Medici ever dared imagine, things have changed considerably.
See, the DOJ, the NSA, and all the rest of the alphabet soup (with the exception of the CIA's self-funding fronts, blinds, and other business interests) have all had to compete for talent and manage personnel under the exceedingly cumbersome rubric of the general schedule system.
This is a system which has produced generations of deeply inbred and incumbent double and triple-dippers, i.e., young retirees from the military who then get on the federal civil service roll and who know and have gamed the system to such an extent that many don't have to produce a whole lot in order to maintain their status, their station, and their lucrative incumbency. I'm guessing that in large measure, the whole complex of outsourced contractors in just about every field of federal endeavor is a response to the realities and limitations that a moribund federal work force imposes.
But back to the topic at hand, outside the echelons of certain elite, or should we say "rogue", self-funding CIA operations, is there really any entity of government that can compete toe-to-toe for talent, or, provide greater access and exposure to a whole world of accumulated knowledge and data than an enormous, brilliantly run, multinational corporation with deep and globe-spanning infrastructural and specialist knowledge?
The minute you understand what Koch Industries is, what it does, and how superbly it does it - in that precise moment you will be forced to accept the very distinct possibility that it is indeed possible for certain entities, under certain circumstances, and with the appropriate malice of forethought - to flatly contradict Jean Paul's admonishment to over-the-hill CIA enforcer Brian Mills "you can't beat the state Bryan!"
Forbes | When WikiLeaks burst onto the international stage in 2010, the small
Nordic nation of Iceland offered it a safe haven. Now American
whistleblower Edward Snowden may be seeking that country’s protection,
and at least one member of its parliament says she’s ready to help.
On Sunday evening Icelandic member of parliament Birgitta Jonsdottir
and Smari McCarthy, executive director of the Icelandic Modern Media
Initiative, issued a statement of support for Snowden, the Booz Allen
Hamilton staffer who identified himself to the Guardian newspaper as the source of a series of top secret documents outlining the NSA’s massive surveillance of foreigners and Americans.
“Whereas IMMI is based in Iceland, and has worked on protections of
privacy, furtherance of government transparency, and the protection of
whistleblowers, we feel it is our duty to offer to assist and advise Mr.
Snowden to the greatest of our ability,” their statement reads. “We are
already working on detailing the legal protocols required to apply for
asylum, and will over the course of the week be seeking a meeting with
the newly appointed interior minister of Iceland, Mrs. Hanna Birna
Kristjánsdóttir, to discuss whether an asylum request can be processed
in a swift manner, should such an application be made.”
It’s not yet clear whether Snowden has officially applied for asylum
in Iceland. A press contact for the Icelandic Ministry of Interior,
which handles asylum requests, said that he hadn’t yet seen an
application from Snowden and that the ministry couldn’t comment until
one was received.
Snowden, who left his home in Hawaii in May and is taking refuge in a
Hong Kong hotel, noted his interest in seeking asylum in Iceland in the Guardian’s interview,
telling the newspaper that his ”predisposition is to seek asylum in a
country with shared values, The nation that most encompasses this is
Iceland,” he said. “They stood up for people over internet freedom.”
What percentage of the Booz Allen Hamilton workforce is black?
Cause, well, you know - as a military contractor, (intelligence industrial complex to be exact) they've got certain regulatory quotas they've got to meet.
I'm saying to myself, "self?"
Why'na phuk during the height of black nationalist foment in the U.S., when the first and arguably greatest barrier crossing brothers and sisters went to work in everything from the national nuclear security adminstration, to bell labs, to the NSA - why were there NEVER any such breaches of security?
But now, when hiring practices are outsourced to 3rd party private entities, (is that because you can't possibly train up a federal, general schedule work force in the type of massively scalable open source technologies?), or, because you can gerrymander employment in that space through private auspices such that black folk never receive consideration - that now you wind up with the human capital management nightmare that GED, parents worked for the Feds, SNOWDEN comprises?
Somebody with more perspicacious online query skills look into this one for me please? I need not only the first line demographic, but also Booz Allen's second-tier black supply chain data, as well.
Finally, I'd like to know whether the http://www.nmsdc.org/nmsdc/#.UbZzL5ycV_Q has been providing mimetic cover for these busters for some time now, as well. Inquiring minds want to know, I want to know....,
politico | According to The Guardian, Snowden was raised in North Carolina and suburban Maryland. Though he did not graduate from high school, the paper said he later received a GED.
The former CIA computer technician who leaked last week’s explosive details about American classified surveillance programs spent just five months in the Army Reserve before he was discharged, records show.
Edward Snowden, the self-proclaimed whistleblower who sent the information to The Guardian and The Washington Post, joined up in 2004, but separated just five months later, an Army official told POLITICO.
“His records indicate he enlisted in the Army Reserve as a Special Forces Recruit (18X) on 7 May 2004 but was discharged 28 September 2004. He did not complete any training or receive any awards,” the spokesman said.
NYTimes | Edward Snowden, a former Central Intelligence Agency worker who
disclosed on Sunday that he was the one who leaked government
surveillance documents to The Guardian newspaper, ranks high among the
disturbed. In an interview
with the newspaper, he called the Internet “the most important
invention in all of human history.” But he said that he believed its
value was being destroyed by unceasing surveillance.
“I don’t see myself as a hero,” he told the paper, “because what I’m
doing is self-interested: I don’t want to live in a world where there’s
no privacy and therefore no room for intellectual exploration and
creativity.”
“I think that’s a dangerous statement,” said Bob Taylor,
a computer scientist who played a major role in the 1960s in
formulating what would become the Internet. “The government should have
told us it was doing this. And that suggests the more fundamental
problem: that we’re not in control of our government.”
For some tech luminaries with less than fond feelings for Washington,
the disclosures about Prism had special force. This was personal.
Bob Metcalfe, the acclaimed inventor of the standard method of connecting computers in one location, wrote on Twitter
that he was less worried about whatever the National Security Agency
might be doing “than about how Obama Regime will use their data to
suppress political opposition (e.g. me).”
But if Silicon Valley is alarmed about the ways that the personal data
now coursing through every byway of the Internet can be misused, it has
been a long time coming.
Last December, top NSA whistleblower William Binney – a 32-year NSA
veteran with the title of senior technical director, who headed the
agency’s global digital data gathering program (featured in a New York Times documentary,
and the source for much of what we know about NSA spying) – said that
the government is using a secret interpretation of Section 215 of the
Patriot Act which allows the government to obtain:
Any data in any third party, like any commercial data that’s held about U.S. citizens ….
(relevant quote starts at 4:19).
I called Binney to find out what he meant.
I began by asking Binney if Business Insider’s speculation was
correct. Specifically, I asked Binney if the government’s secret
interpretation of Section 215 of the Patriot Act was that a foreign
company – like Narus, for example – could vacuum up information on
Americans, and then the NSA would obtain that data under the excuse of
spying on foreign entities … i.e. an Israeli company.
Binney replied no … it was broader than that.
Binney explained that the government is taking the position that it can gather and use any information about American citizens living on U.S. soil if it comes from:
Any service provider … any third party … any commercial company – like a telecom or internet service provider, libraries, medical companies – holding data about anyone, any U.S. citizen or anyone else.
I followed up to make sure I understood what Binney was saying,
asking whether the government’s secret interpretation of Section 215 of
the Patriot Act was that the government could use any information as
long as it came from a private company … foreign or domestic.
In other words, the government is using the antiquated, bogus legal
argument that it was not using its governmental powers (called “acting
under color of law” by judges), but that it was private companies just doing their thing (which the government happened to order all of the private companies to collect and fork over).
Binney confirmed that this was correct. This is what the phone company spying program and the Prism
program – the government spying on big Internet companies – is based
upon. Since all digital communications go through private company
networks, websites or other systems, the government just demands that all of the companies turn them over.
usnews |The spy in your pocket. And that doesn’t even get
into the personal, portable surveillance tools practically everyone in
the country voluntarily carries around with them: mobile phones and
other wireless devices. Pew Research reported this week that for the
first time a majority of Americans own a smart phone
of some kind, while fully 91 percent of the adult population now owns
some flavor of cell phone. (The wireless industry lobbying group CTIA
reports that wireless devices have now reached 102 percent penetration in the U.S. and its territories, which means that the machines now outnumber the people.)
And if you’re using your mobile phone, you’re being tracked. “I don’t
think people realize they’re revealing their location to their carrier
just by using their device,” says Ashkan Soltani, an independent privacy
researcher and consultant. A 2011 investigation by the Wall Street
Journal (on which Soltani consulted) found that Apple and Android smart phones routinely send location information,
including information about local Wi-Fi networks, back to Apple and
Google. Separately, the Journal reported in 2011, Apple’s iPhone
collected and stored location data even when users had turned off
“location services” – which is to say when they thought they had opted
out of being tracked.
Why? This information is a potential treasure trove for these companies. From the Journal:
Google and Apple are gathering location information as part of their
race to build massive databases capable of pinpointing people’s
locations via their cellphones. These databases could help them tap the
$2.9 billion market for location-based services – expected to rise to
$8.3 billion in 2014, according to research firm Gartner, Inc.
Google uses this information to help show on its maps where
automobile traffic is especially heavy or light. Verizon sells aggregate
location data to advertisers, according to Soltani, so they can know
where to place billboards. The wireless companies' viewpoint, according
to Soltani, is “we got this information for free, let’s use it for this
other use-case, which is the marketing data.”
And there are a lot of companies trying to get a piece of this
financial pie. In another story, the Journal surveyed 101 popular iPhone
and Android apps and found that “56 transmitted the phone’s unique
device ID to other companies without users’ awareness or consent.
Forty-seven apps transmitted the phone’s location in some way. Five sent
age, gender and other personal details to outsiders.” As Soltani told a
Senate subcommittee in 2011, “applications can access and transmit data
which includes text messages, emails, phone numbers, contacts stored
and even browser history stored on the device.”
So if you woke yourself up this morning with an alarm clock app on
your phone, the instant it went off, says Soltani, not only did it
transmit noise to your ears but location data back to people you don't
know. “There are times where there are 50 or 100 third parties –
companies that you’ve never had a relationship with – who are able to
monitor your … activities,” he says.
Not big on apps? Consider your next visit to the local mall. Carriers
and other companies are installing sensors around shopping malls,
Soltani says, allowing them to track where people are lingering, what’s
popular and what’s not, analytics that then go to the mall.
Perverse incentive. All of this creates what Soltani
calls a “perverse incentive that creates this worst case scenario for
consumers.” Companies have an incentive to collect and keep user data;
and that trove proves an irresistible target for the government in its
ongoing war on terrorists.
Which brings us back to the current uproar over the NSA’s data
collection and data mining. The outrage is justified, as is the broader
concern about how the cult of secrecy has infected and distorted the government.
But there is something somewhat comforting to the notion that
government agencies are ultimately responsible to the voters, even if
that process has become calcified and overly complex.
But the surveillance state is built upon its corporate counterpart. And who watches those watchers?
WaPo | Edward Snowden, a 29-year-old former undercover CIA employee,
unmasked himself Sunday as the principal source of recent Washington
Post and Guardian disclosures about top-secret National Security Agency programs.
Snowden, who has contracted for the NSA and works for the
consulting firm Booz Allen Hamilton, denounced what he described as
systematic surveillance of
innocent citizens and said in an interview that “it’s important to send
a message to government that people will not be intimidated.”
Director of National Intelligence James R. Clapper Jr. said Saturday
that the NSA had initiated a Justice Department investigation into who
leaked the information — an investigation supported by intelligence
officials in Congress.
Snowden, whose full name is Edward Joseph
Snowden, said he understands the risks of disclosing the information but
felt it was important to reveal.
“I intend to ask for asylum from
any countries that believe in free speech and oppose the victimization
of global privacy,” Snowden told The Post from Hong Kong, where he has
been staying. The Guardian was the first to publicly identify Snowden.
Both media organizations made his name public with his consent.
“I’m
not going to hide,” Snowden said Sunday afternoon. “Allowing the U.S.
government to intimidate its people with threats of retaliation for
revealing wrongdoing is contrary to the public interest.”
Asked
whether he believed his disclosures would change anything, he said: “I
think they already have. Everyone everywhere now understands how bad
things have gotten — and they’re talking about it. They have the power
to decide for themselves whether they are willing to sacrifice their
privacy to the surveillance state.”
Snowden said nobody was aware
of his actions, including those closest to him. He said there wasn’t a
single event that spurred his decision to leak the information.
“It
was more of a slow realization that presidents could openly lie to
secure the office and then break public promises without consequence,”
he said.
Snowden said President Obama hasn’t lived up to his
pledges of transparency. He blamed a lack of accountability in the Bush
administration for continued abuses. The White House could not
immediately be reached for comment Sunday afternoon.
“It set an
example that when powerful figures are suspected of wrongdoing,
releasing them from the accountability of law is ‘for our own good,’ ”
Snowden said. “That’s corrosive to the basic fairness of society.”
whyevolutionistrue | The great step forward made by Watson and Crick in their second paper was to take these pre-existing ideas and reshape them in a less literal form. The sequence of bases was no longer seen in terms of a physical template for protein synthesis, but as something far more abstract – a code carrying genetical information.
What is intriguing is where this novel interpretation came from. The first person who explicitly suggested that genes contained a ‘code-script’ was the physicist Erwin Schrödinger, in 1943. Although his ideas were widely-read, there were few attempts to explore the idea of a ‘code’, because the physical nature of the gene was unknown.
The importance of ‘information’ as an abstract concept – so widespread in our modern view – was a direct product of war-time work on electronic transmissions by Claude Shannon, and on the development of control systems to guide anti-aircraft guns carried out by Norbert Wiener. In 1948, these two mathematicians each published a popular book – Information Theory and Cybernetics, respectively. (For best-sellers they contained a surprising number of mathematical formulae. Maybe people were more maths-savvy back then. Or more tolerant of things they didn’t quite understand.)
There were a growing number of meetings at which physicists, mathematicians and biologists tried to see how they could forge a new way of looking at life (the cyberneticians were particularly bold in this respect). In the end, nothing came of these attempts, but at some point along the way, the idea of seeing that genes contain ‘information’ seeped its way into Watson and Crick’s thinking, leading them to explain the implications of the double helix structure in this radically novel way.
How exactly the pair came up with the idea is not known (that’s why yesterday I asked Jerry to ask Watson this question when they met – we should get a post on this later today). We know that Crick wrote most of this article, in a terrible hurry. Did either of them read Shannon or Wiener? Or were these just terms they heard floating about on the Cambridge air, or idly discussed in the corridors at conferences? Whatever the case, today it is impossible to think about genes – or evolution – without using this powerful metaphor.
wikipedia |What Is Life? is a 1944 non-fiction science book written for the lay reader by physicist Erwin Schrödinger. The book was based on a course of public lectures delivered by Schrödinger in February 1943, under the auspices of the Dublin Institute for Advanced Studies at Trinity College, Dublin.
The lectures attracted an audience of about 400, who were warned "that
the subject-matter was a difficult one and that the lectures could not
be termed popular, even though the physicist’s most dreaded weapon,
mathematical deduction, would hardly be utilized."[1]
Schrödinger's lecture focused on one important question: "how can the
events in space and time which take place within the spatial boundary of
a living organism be accounted for by physics and chemistry?"[1]
In the book, Schrödinger introduced the idea of an "aperiodic
crystal" that contained genetic information in its configuration of
covalent chemical bonds. In the 1950s, this idea stimulated enthusiasm for discovering the genetic molecule. Although the existence of DNA
had been known since 1869, its role in reproduction and its helical
shape were still unknown at the time of Schrödinger's lecture. In
retrospect, Schrödinger's aperiodic crystal can be viewed as a
well-reasoned theoretical prediction of what biologists should have been
looking for during their search for genetic material. Both James D. Watson,[2] and independently, Francis Crick,
co-discoverers of the structure of DNA, credited Schrödinger's book
with presenting an early theoretical description of how the storage of genetic information would work, and each respectively acknowledged the book as a source of inspiration for their initial researches.[3]
exploratorium | We wish to suggest a structure for the salt of deoxyribose
nucleic acid (D.N.A.). This structure has novel features which are of
considerable biological interest.
A structure for nucleic
acid has already been proposed by Pauling (4)
and Corey1.
They kindly made their manuscript available to us in advance of publication.
Their model consists of three intertwined chains, with the phosphates
near the fibre axis, and the bases on the outside. In our opinion, this
structure is unsatisfactory for two reasons:
(1) We believe that
the material which gives the X-ray diagrams is the salt, not the free
acid. Without the acidic hydrogen atoms it is not clear what forces would
hold the structure together, especially as the negatively charged phosphates
near the axis will repel each other.
(2) Some of the van
der Waals distances appear to be too small.
Another three-chain
structure has also been suggested by Fraser (in the press). In his model
the phosphates are on the outside and the bases on the inside, linked
together by hydrogen bonds. This structure as described is rather ill-defined,
and for this reason we shall not comment on it. We
wish to put forward aradically different structure
for the salt of deoxyribose nucleic acid (5).
This structure has two helical chains each coiled round the same axis
(see diagram). We have made the usual chemical assumptions, namely, that
each chain consists of phosphate diester groups joining beta-D-deoxyribofuranose
residues with 3',5' linkages. The two chains (but not their bases) are
related by a dyad perpendicular to the fibre axis. Both chains follow
right-handed helices, but owing to the dyad the sequences of the atoms
in the two chains run in opposite directions
(6) . Each chain loosely resembles Furberg's2
model No. 1 (7); that is, the bases are on the inside of the
helix and the phosphates on the outside. The configuration of the sugar
and the atoms near it is close to Furberg's "standard configuration,"
the sugar being roughly perpendicular to the attached base. There is a
residue on each every 3.4 A. in the z-direction. We have assumed
an angle of 36° between adjacent residues in the same chain, so that
the structure repeats after 10 residues on each chain, that is, after
34 A. The distance of a phosphorus atom from the fibre axis is 10 A. As
the phosphates are on the outside, cations have easy access to them.
wired | At the most basic level, scientists create phylogenetic trees by
grouping species according to their degree of relatedness. Lining up the
DNA of humans, chimpanzees and fish, for example, makes it readily
apparent that humans and chimps are more closely related to each other
than they are to fish.
Researchers once used just one gene or a handful to compare
organisms. But the last decade has seen an explosion in phylogenetic
data, rapidly inflating the data pool for generating these trees. These
analyses filled in some of the sparse spots on the tree of life, but
considerable disagreement still remains.
For example, it’s not clear whether snails are most closely related
to clams and other bivalves or to another mollusk group known as tusk
shells, said Rokas. And we have no idea how some of the earliest animals
to branch off the tree, such as jellyfish and sponges, are related to
each other. Scientists can rattle off examples of conflicting trees
published in the same scientific journal within weeks, or even in the same issue.
“That poses a question: Why do you have this lack of agreement?” said Rokas.
Rokas and his graduate student Leonidas Salichos explored that question by evaluating each gene independently
and using only the most useful genes — those that carry the greatest
amount of information with respect to evolutionary history — to
construct their tree.
They started with 23 species of yeast, focusing on 1,070 genes. They
first created a phylogenetic tree using the standard method, called
concatenation. This involves stringing together all the sequence data
from individual species into one mega-gene and then comparing that long
sequence among the different species and creating a tree that best
explains the differences.
The resulting tree was accurate according to standard statistical
analysis. But given that similar methods have produced trees of life
that are rife with contradiction, Rokas and Salichos decided to delve
deeper. They built a series of phylogenetic trees using data from
individual yeast genes and employed an algorithm derived from
information theory to find the areas of greatest agreement among the
trees. The result, published in Nature in May, was unexpected. Every gene they studied appeared to tell a slightly different story of evolution.
“Just about all the trees from individual genes were in conflict with
the tree based on a concatenated data set,” says Hilu. “It’s a bit
shocking.”
They concluded that if a number of genes support a specific
architecture, it is probably accurate. But if different sets of genes
support two different architectures equally, it is much less likely that
either structure is accurate. Rokas and Salichos used a statistical
method called bootstrap analysis to select the most informative genes.
In essence, “if you take just the strongly supported genes, then you recover the correct tree,” said Donoghue.Fist tap Dale.
Rejuvenation Pills
-
No one likes getting old. Everyone would like to be immorbid. Let's be
careful here. Immortal doesnt include youth or return to youth. Immorbid
means you s...
Death of the Author — at the Hands of Cthulhu
-
In 1967, French literary theorist and philosopher Roland Barthes wrote of
“The Death of the Author,” arguing that the meaning of a text is divorced
from au...
9/29 again
-
"On this sacred day of Michaelmas, former President Donald Trump invoked
the heavenly power of St. Michael the Archangel, sharing a powerful prayer
for pro...
Return of the Magi
-
Lately, the Holy Spirit is in the air. Emotional energy is swirling out of
the earth.I can feel it bubbling up, effervescing and evaporating around
us, s...
New Travels
-
Haven’t published on the Blog in quite a while. I at least part have been
immersed in the area of writing books. My focus is on Science Fiction an
Historic...
Covid-19 Preys Upon The Elderly And The Obese
-
sciencemag | This spring, after days of flulike symptoms and fever, a man
arrived at the emergency room at the University of Vermont Medical Center.
He ...