Tuesday, August 27, 2013

fixing old markets with new markets the origins and practice of neoliberalism...,


nakedcapitalism | NT: Your new book, Never Let a Serious Crisis Go to Waste, is not the first work you have produced that discusses Neoliberalism. In the Postscript to the book you edited entitled “The Road from Mont Pèlerin: The Making of the Neoliberal Thought Collective” you state that:
[O]ur own guiding heuristic has been that Neoliberalism has not existed in the past as a settled or fixed state, but is better understood as a transnational movement requiring time and substantial effort in order to attain the modicum of coherence and power it has achieved today. It was not a conspiracy; rather, it was an intricately structured long-term philosophical and political project, or in our terminology, a “thought collective”.
Given this context, could you explain what the salient features of Neoliberalism are? In particular it would be helpful if you explained about why “traditional” approaches to intellectual history are inadequate for understanding Neoliberalism.

PM: Standard history of economics has been mired in the primacy of the individual author/intellectual for quite some time now. There, one tends to become attached to some particular intellectual hero, reads everything they wrote, and hence seeks to channel ‘their’ ideas to a general audience. Maybe one consults a few of their allies or opponents to add a dash of ‘context’. This, perhaps inadvertently, has resulted in deep misunderstanding of how economics has developed over the last century or more.

Ideas generally don’t incubate like that. Traditions in the history and sociology of science [my current disciplinary home] have developed a number of methods and devices in order to highlight the elaborate social character of intellectual disciplines, and display the complex trajectories of validation of knowledge. The landmarks there are many, but the one I lean upon in Never Let a Serious Crisis go to Waste is the concept of a ‘thought collective’ that dates back to the work of Ludwik Fleck.*
Whatever one thinks of the specifics, that framework has permitted me to write a history of Neoliberalism which comes to terms with some of its more slippery aspects. In the first instance, it nurtures appreciation for the fact that Neoliberalism is both a set of philosophical doctrines – and not, as some would have it, a narrow few abstract propositions in economics—and a flexible ongoing political project. The doctrines and the details of the project change through time, as do the roster of protagonists, but still maintain a coherence and stability that justifies treating the movement as an historical collective. Next, it insists that Neoliberalism cannot be reduced to the writings of the few standout neoliberals that readers of this blog may have heard of – Friedrich Hayek, Milton Friedman, James Buchanan, Gary Becker – primarily because their individual tenets conflict, some with each other, and some with some other less famous comrades. Fleck points us towards the fact that thought collectives are held together, in part, by formal social structures; in the case of the Neoliberals, it started out as the Mont Pèlerin Society [MPS] in 1947, but by the 1980s it was extended to a connected ring of think tanks around the world, from the Institute for Economic Affairs to the American Enterprise Institute to Heritage and Cato to the Atlas Foundation and beyond. As early as 1956, the Volker Fund maintained a list of 1,841 affiliated individuals; the corresponding number easily exceeds the tens of thousands today. Clearly the thought collective harbors strong impressions of who is in and who is out.

Perhaps more importantly, the ‘thought collective’ approach has helped me grapple with one of the most nettlesome aspects of Neoliberalism: How can one write an intellectual history of a bunch of anti-intellectual intellectuals? Some readers may have encountered Hayek’s sneers about those whom he dubs ‘second-hand dealers in ideas’; but that is just symptomatic of a more general stance towards knowledge which sets the Neoliberals apart from almost every other thought collective in recent history. As I explain in Chapter 2, the MPS became a society of ‘rationalists’ who ended up promoting ignorance as a virtue for the larger population. Others have also documented this straddle in their think tank perimeter, such as Tom Medvetz in his Think Tanks in America. It seems we are not in Kansas anymore (apologies to Tom Frank).

Thus, to write a history of Neoliberalism in the current crisis, Fleck counsels one must connect their various epistemic attitudes to the content of their doctrines. In the case of modern Neoliberalism, this has been made manifest in their shared conviction that The Market knows more than any human being, however wise or well-schooled. Planning is doomed; socialism is a pipe dream. The political project of Neoliberalism is not laissez-faire; rather, it is to use state power to get the populace to prostrate themselves before the only dependable source of Truth and Wisdom in human civilization—viz., something they call “The Market”. The more discombobulated the average citizen can be rendered, the quicker they will get with the program

the fight for control over people as subjects...,


theoccupiedtimes | Various statutes including DPA 1998, RIPA 2000, ACSA 2001, and the proposed Communications Data bill all display the state’s attempts to control the wisps of algorithms, identities and data in the global communications databank. The right to the city – the focus of this issue – is another aspect of the same struggle. It is a fight for control over people as ‘subjects’, the spaces and currents we move between and occupy and the coercive forms of commodity and debt that shape and define our environment. 

Communities are fracturing as their inhabitants are flung to the periphery in the name of ‘regeneration’ and ‘redevelopment’. It is plainly apparent that the intention of policymakers is to purge central London, making it into a hub for commercial wealth. A grand supra-geographic terrain is being mapped, ensuring the global reach of national and supranational states of surveillance. In these physical and digital gated communities, free spaces for different identities to meet and create new social relations are limited. Under the guise of ‘protection’, all space in the city becomes monitored in true panopticon style. But this is not for the ‘greatest happiness for the greatest number’ as the proposed utility of this operation would have us believe.
Under Article 8 of the European Convention on Human Rights, the right to respect for private and family life, home and correspondence exists, but not as an absolute right. It is curtailed ‘in accordance with the law’ and ‘where necessary in a democratic society’ i.e. by the state in the interests of ‘national security’, ‘public safety or the economic well-being of the country’, for ‘the prevention of disorder or crime’ etc; a very broad range of vague restrictions which are available to public authorities to curb our right to privacy. A form of global sovereign power has emerged, which comprises the dominant nation-states together with supranational institutions and major capitalist corporations with increasingly unlimited access to intelligence, and unhindered powers to usurp rights and property.
Within this global configuration, it becomes incredibly difficult to claim any right or power, especially when you are the one being regenerated – many residents who have fallen foul of ‘regeneration’ schemes are not given all the information they need, or are purposely misled by public relations representatives. Some are forcibly evicted without any meaningful redress, others face state-sanctioned brutality when protecting their space and communities, like those recently violently evicted from an established community on Rushcroft Road, Brixton. There is no power for people under the market-state duopoly: people have no right to ask how and why they are being dispossessed, how and why they are being surveilled, or for whose benefit, for fear of interfering with ‘business sensitivities’, revenue-generating streams or the power of the state and its corporate partners.
Various anti-eviction and private renters groups have sprung up in London, joining with already established similar groups  - a positive sign that an alternative to the status quo does exist, and the numbers in the multitude are growing. Housing action groups and dedicated campaigns continue to mushroom across the city, challenging the spread of powerful global networks of hierarchy and division. They are signs that an alternative network is slowly being produced whereby difference can be expressed through collaborative means. The common can take root and begin to shape itself.

Monday, August 26, 2013

34 years of protest pictured on a map...,



foreignpolicy | This is what data from a world in turmoil looks like. The Global Database of Events, Language, and Tone (GDELT) tracks news reports and codes them for 58 fields, from where an incident took place to what sort of event it was (these maps look at protests, violence, and changes in military and police posture) to ethnic and religious affiliations, among other categories. The dataset has recorded nearly 250 million events since 1979, according to its website, and is updated daily. 

John Beieler, a doctoral candidate at Penn State, has adapted these data into striking maps, like the one above of every protest recorded in GDELT -- a breathtaking visual history lesson. Some events to watch for as you scroll through the timeline:
  • Strikes and protests in response to British Prime Minister Margaret Thatcher's economic reforms.
  • Poland lighting up through the 1980s while Cold War-era Eastern Europe stays dark.
  • The escalation of apartheid protests in South Africa in the late 1980s.
  • The fall of the Berlin Wall and the rise of protests in Eastern Europe preceding the end of the Soviet Union.
  • Protests in Iraq coinciding with Operation Desert Storm in early 1991.
  • The explosion of protests in the United States since 2008 -- think Occupy Wall Street and the Tea Party movements.
  • Iran's Green Movement protests after the presidential election in 2009.
  • The Arab Spring, with protests stretching across North Africa and the Middle East starting in 2011.
  • The persistence of protests in perennial hotspots like Kashmir, Tibet, and Israel and the West Bank.
The map also shows some of the limits of Big Data -- and trying to reduce major global events to coded variables. Take, for example, the protests across the United States in late 2011: Some are Occupy protests, others are Tea Party protests, but the difference in the political identity of those demonstrations isn't reflected in the map. There are some strange things that happen when the data are mapped, as well. A cursory glance at the map would suggest that Kansas is the most restive state in the union, but really the frequent protests popping up somewhere near Wichita are every media mention of a protest in the United States that doesn't specify a city (the same goes for that flickering dot north of Mongolia in Middle-of-Nowhere, Russia).

Sunday, August 25, 2013

american racism explains the decline of american public institutions and all americans will suffer in consequence of this fact...,


businessinsider | A society — any society —- is defined as a set of mutual benefits and duties embodied most visibly in public institutions: public schools, public libraries, public transportation, public hospitals, public parks, public museums, public recreation, public universities, and so on.

Public institutions are supported by all taxpayers, and are available to all. If the tax system is progressive, those who are better off (and who, presumably, have benefitted from many of these same public institutions) help pay for everyone else.

"Privatize" means "Pay for it yourself." The practical consequence of this in an economy whose wealth and income are now more concentrated than at any time in the past 90 years is to make high-quality public goods available to fewer and fewer.

In fact, much of what’s called “public” is increasingly a private good paid for by users — ever-higher tolls on public highways and public bridges, higher tuitions at so-called public universities, higher admission fees at public parks and public museums.

Much of the rest of what’s considered “public” has become so shoddy that those who can afford to do so find private alternatives. As public schools deteriorate, the upper-middle class and wealthy send their kids to private ones. As public pools and playgrounds decay, the better-off buy memberships in private tennis and swimming clubs. As public hospitals decline, the well-off pay premium rates for private care.

Gated communities and office parks now come with their own manicured lawns and walkways, security guards and backup power systems.

Why the decline of public institutions? The financial squeeze on government at all levels since 2008 explains only part of it. Fist tap Arnach.

innapropriate behavior impoverishes..., (rodney king syndrome at the 7:00 minute mark)


dreamandhustle | I want to make something very clear about wannabee cats running around Dream and Hustle or circling about Dream and Hustle and make sure everybody understand – I do not read, watch, listen to or subscribe to Dr. Claude Anderson and do not know much about what he say or what he offers. If Dream and Hustle sounds like Dr. Claude Anderson it is because we see the same obvious symptoms in our community and our economic outlook and the only thing that means to you is that Dr. Claude Anderson and we independently validated each other talking points that what we talking about is real – that is what you better realize.

Now, as you watch this video which is 2 hours and I’m not expecting you to watch it in one set. I need you to check out something as we did in our analysis. We want you to look at Dr. Claude Anderson solution he proposed. Notice he is saying the same thing we discovered here at Dream and Hustle about creating manufacturing, entertainment and distribution frameworks to our cities. But he said something interesting about technology that I don’t believe Dr. Anderson believe today.

What I took away from this video is we have too much “talking about the problem” instead of talking about the solution in the Black community. This is why I cannot hang around cornballs who talk about Powernomics or Dr. Anderson or come around me and post “you need to read..” – homey, I don’t need to read ish. Think about what homey just told me – I need to read…no, I need to get my behind out there in the real world and make a damn difference for my people, my community and our children future.

The truth of the matter is, we need to speak two hours on solutions and how to implement solutions and realize the past and previous history is nothing more than archaic data that has only nostalgia value. What happens yesterday do not matter, how we handle right now and setup for our future tomorrow matters and the only thing worth talking about. Dr. Anderson spend too much time talking about the problem, cats want to sympathize with the problem but when it comes to solutions – where’s the beef? We need to talk 80% solutions at this point and that’s why you don’t see me getting along with these lame ass book readers in the Black community talking about Amos Wilson and Claude Anderson all the time. 

Sorry, but in this video all I heard was problems and the solution was already implemented during the Great Migration – he providing an old school model that cannot compete with the Chinese fishing industry and leather making industry. Haiti?! Not Nicaragua that has Black community or even Honduras that has a Black community?! Some of yall want to worship this Dr. Claude Anderson dude and his books more than work on real solutions to the Black community problems…keep it real.

whatchoo thank?

In the event that the moderator kwestins are inadequate to the subject matter at hand, please feel free to hold forth here with disqus and properly express yourself...,

Saturday, August 24, 2013

projects that develop open-source data or software



sunlightfoundation | We know how challenging fundraising can be. You start an innovative project using technology to make government more open and accessible and halfway through -- you run out of money. Or maybe you know someone who is collecting municipal data and wants to make a cool app to help residents understand how local government works, but they don’t have funding.

If you are developing an open source tool and are looking for funds to jumpstart the project, apply now for an OpenGov Grant from the Sunlight Foundation. We are offering one-time grants in the range of $5,000 to $10,000 to help you fulfill your vision of making government more transparent and accountable. Discover how we will take your project to its next stage of development.

View our grant guidelines and apply for an OpenGov Grant.

the spectacular power and potential of open-source biology...,


sciencecodex | Researchers from Case Western Reserve University School of Medicine and the Dana-Farber Cancer Institute have made a fundamental discovery relevant to the understanding and treatment of heart failure – a leading cause of death worldwide. The team discovered a new molecular pathway responsible for causing heart failure and showed that a first-in-class prototype drug, JQ1, blocks this pathway to protect the heart from damage.

In contrast to standard therapies for heart failure, JQ1 works directly within the cell's command center, or nucleus, to prevent damaging stress responses. This groundbreaking research lays the foundation for an entirely new way of treating a diseased heart. The study is published in the August 1 issue of Cell

"As a practicing cardiologist, it is clear that current heart failure drugs fall alarmingly short for countless patients. Our discovery heralds a brand new class of drugs which work within the cell nucleus and offers promise to millions suffering from this common and lethal disease," said Saptarsi Haldar, MD, senior author on the paper, assistant professor of medicine at Case Western Reserve and cardiologist at University Hospitals Case Medical Center.

Heart failure occurs when the organ's pumping capacity cannot meet the body's needs. Existing drugs, most of which block hormones such as adrenaline at the cell's outer surface, have improved patient survival. Unfortunately, several clinical studies have demonstrated that heart failure patients taking these hormone-blocking drugs still succumb to high rates of hospitalization and death. Leveraging a new approach, the research team turned their attention from the cell's periphery to the nucleus – the very place that unleashes sweeping damage-control responses which, if left unchecked, ultimately destroy the heart. 

The team found that a new family of genes, called BET bromodomains, cause heart failure because they drive hyperactive stress responses in the nucleus. Prior research linking BET bromodomains to cancer prompted the laboratory of James Bradner, MD, the paper's senior author and a researcher at the Dana-Farber, to develop a direct-acting BET inhibitor, called JQ1. In models of cancer, JQ1 functions to turn off key cancer-causing genes occasionally prompting cancer cells to "forget" they are cancer. In models of heart failure, JQ1 silences genetic actions causing enlargement of and damage to the heart – even in the face of overwhelming stress.

"While it's been known for many years that the nucleus goes awry in heart failure, potential therapeutic targets residing in this part of the cell are often dubbed as 'undruggable' given their lack of pharmacological accessibility," said Jonathan Brown, MD, cardiologist at Brigham and Women's Hospital and co-first author on the paper. "Our work with JQ1 in pre-clinical models shows that this can be achieved successfully and safely."  Fist tap Dale.

breath straight kicking like cancer....,


thescientist | Fusobacterium nucleatum is a Gram-negative oral commensal microbe, but it has the potential to become pathogenic, occasionally causing periodontal disease. In October 2011, two separate teams from Canada’s BC Cancer Agency and the Broad Institute in Cambridge showed that the bacterium could also be found in the gut, where its abundance was associated with colorectal cancer. Now, two new studies present functional evidence to help explain how F. nucleatum spurs the development of cancer.

In papers published in Cell Host & Microbe today (August 13), teams led by Harvard Medical School’s Aleksandar Kostic and Case Western Reserve University’s Mara Roxana Rubinstein used a mouse model of intestinal tumorigenesis and human colon cancer cells, respectively, to show that F. nucleatum induces proinflammatory and oncogenic activities that promote the growth of colorectal cancer.

“It is usually impossible to infer whether microbes are causative or opportunistic colonizers without functional studies,” said Robert Holt, who led the BC Cancer Agency team that in 2011 reported an association between F. nucleatum in the gut and colorectal cancer but was not involved in the present studies. “Identifying an infectious origin for disease almost always starts with observing an association between the presence of a microbe and the presence of a particular pathology, but an understanding of causality—or lack thereof—requires the gradual accumulation of experimental and epidemiological evidence,” such as that reported today.

The Washington University School of Medicine’s Gautam Dantas agreed that the new work helps distinguish cause from consequence. “Is an observed altered microbiome state in a diseased individual the cause of the disease, or a symptom?” Dantas, who was not involved in the studies, wrote in an e-mail to The Scientist. The papers published today “report on significant strides towards . . . identifying the mechanisms by which a human commensal bacterium, Fusobacterium nucleatum, promotes colorectal cancer.”

Friday, August 23, 2013

lockhart's lament


maa | The first thing to understand is that mathematics is an art. The difference between math and the other arts, such as music and painting, is that our culture does not recognize it as such.

Everyone understands that poets, painters, and musicians create works of art, and are expressing themselves in word, image, and sound. In fact, our society is rather generous when it comes to creative expression; architects, chefs, and even television directors are considered to be working artists. So why not mathematicians?

Part of the problem is that nobody has the faintest idea what it is that mathematicians do. The common perception seems to be that mathematicians are somehow connected with science— perhaps they help the scientists with their formulas, or feed big numbers into computers for some reason or other. There is no question that if the world had to be divided into the “poetic dreamers” and the “rational thinkers” most people would place mathematicians in the latter category.

Nevertheless, the fact is that there is nothing as dreamy and poetic, nothing as radical, subversive, and psychedelic, as mathematics. It is every bit as mind blowing as cosmology or physics (mathematicians conceived of black holes long before astronomers actually found any), and allows more freedom of expression than poetry, art, or music (which depend heavily on properties of the physical universe). Mathematics is the purest of the arts, as well as the most misunderstood.

So let me try to explain what mathematics is, and what mathematicians do. I can hardly do better than to begin with G.H. Hardy’s excellent description:
A mathematician, like a painter or poet, is a maker of patterns. If his patterns are more permanent than theirs, it is because they are made with ideas.
So mathematicians sit around making patterns of ideas. What sort of patterns? What sort of ideas? Ideas about the rhinoceros? No, those we leave to the biologists. Ideas about language and culture? No, not usually. These things are all far too complicated for most mathematicians’ taste. If there is anything like a unifying aesthetic principle in mathematics, it is this: simple is beautiful. Mathematicians enjoy thinking about the simplest possible things, and the simplest possible things are imaginary.

For example, if I’m in the mood to think about shapes— and I often am— I might imagine a triangle inside a rectangular box:

I wonder how much of the box the triangle takes up? Two-thirds maybe? The important thing to understand is that I’m not talking about this drawing of a triangle in a box. Nor am I talking about some metal triangle forming part of a girder system for a bridge. There’s no ulterior practical purpose here. I’m just playing. That’s what math is— wondering, playing, amusing yourself with your imagination. For one thing, the question of how much of the box the triangle takes up doesn’t even make any sense for real, physical objects. Even the most carefully made physical triangle is still a hopelessly complicated collection of jiggling atoms; it changes its size from one minute to the next. That is, unless you want to talk about some sort of approximate measurements. Well, that’s where the aesthetic comes in. That’s just not simple, and consequently it is an ugly question which depends on all sorts of real-world details. Let’s leave that to the scientists. The mathematical question is about an imaginary triangle inside an imaginary box. The edges are perfect because I want them to be— that is the sort of object I prefer to think about. This is a major theme in mathematics: things are what you want them to be. You have endless choices; there is no reality to get in your way.

On the other hand, once you have made your choices (for example I might choose to make my triangle symmetrical, or not) then your new creations do what they do, whether you like it or not. This is the amazing thing about making imaginary patterns: they talk back! The triangle takes up a certain amount of its box, and I don’t have any control over what that amount is. There is a number out there, maybe it’s two-thirds, maybe it isn’t, but I don’t get to say what it is. I have to find out what it is.

So we get to play and imagine whatever we want and make patterns and ask questions about them. But how do we answer these questions? It’s not at all like science. There’s no experiment I can do with test tubes and equipment and whatnot that will tell me the truth about a figment of my imagination. The only way to get at the truth about our imaginations is to use our imaginations, and that is hard work.

footnote 14 - clapper, alexander, an'em - are some lying sacks....,


WaPo | Footnote 14 should scare every American. Even the parts that aren’t blacked out.

The footnote is contained in the just-declassified 2011 opinion by U.S. District Judge John Bates, then the chief judge of the Foreign Intelligence Surveillance Court. 

In the ruling, Bates found that the government had been sweeping up e-mails before receiving court approval in 2008 and, even after that, was illegally collecting “tens of thousands of wholly domestic communications.” 

That’s not the really scary part. This is: “The court is troubled that the government’s revelations . . . mark the third instance in less than three years in which the government has disclosed a substantial misrepresentation regarding the scope of a major collection program,” Bates wrote in Footnote 14.
He cited a 2009 finding that the court’s approval of the National Security Agency’s telephone records program was premised on “a flawed depiction” of how the NSA uses metadata, a “misperception . . . buttressed by repeated inaccurate statements made in the government’s submissions, and despite a government-devised and Court-mandated oversight regime.

“Contrary to the government’s repeated assurances, NSA had been routinely running queries of the metadata using querying terms that did not meet the required standard for querying. The Court concluded that this requirement had been ‘so frequently and systemically violated that it can fairly be said that this critical element of the overall . . . regime has never functioned effectively.’ ”

Followed by two full paragraphs of redactions. We can only imagine what that episode entailed.
To judge the significance of Bates’s footnote, it helps to know something about the judge. This is no wild-eyed liberal. Bates spent almost two decades in the U.S. Attorney’s Office in Washington. He served as deputy to independent counsel Kenneth Starr during the investigation of President Bill Clinton. He was named to the bench by President George W. Bush. 

If Bates is worked up about being misled by the government — and the sober language of that footnote is the judicial version of a severe dressing-down — people should listen.

Thursday, August 22, 2013

wizards summoned to battle the all-seeing eye!!!



slate | It was more than 20 years ago that I received my first security briefing, and a lot of what I learned is now outdated. Back then, few had heard of what was nicknamed "No Such Agency," and the government wanted to keep it that way. We were taught not to breathe a word about the NSA; if anyone asked, we worked for the Department of Defense. That's even what it said on my resume and one of my NSA-issued ID cards. Now there's little point to such pretense. The agency has been outed and is a regular fixture of Page 1 headlines. In 1992, I was taught that the code words we stamped on all our classified documents were a closely guarded secret, that it was a crime to reveal them to outsiders. But a quick Google search shows that government websites are chock-full of papers clearly marked with words and phrases that were at one time for the eyes of only those few with the need to know.

Another thing they used to say at those briefings was that the might of the NSA would never be used against U.S. citizens. Back when I signed up, the agency made it crystal clear to us that we were empowered to protect our nation against only foreign enemies, not domestic ones. To do otherwise was against the NSA charter. More importantly, I got the strong sense that it was against the culture of the place. After working there for two summers, I genuinely believed that my colleagues would be horrified if they thought our work was being used to snoop on fellow Americans. Has that changed, too?

The mathematicians and cryptanalysts I met were from all over the country and had very different backgrounds, but we all seemed to be drawn to the agency for the same two reasons. First, we all knew that the math was sexy. This might sound bizarre to a non-mathematician, but certain mathematical problems just exude a certain something—a feeling of importance, of gravity, along with a sense that the solution is not far outside of your grasp. It's big, and it can be yours if you just think a little bit harder. When I signed up, I knew that the NSA was doing interesting math, but I had no idea what I was in for. Within a week of arriving at the NSA, I was presented with an amazing smorgasbord of the most alluring mathematics problems I had ever seen, any of which could possibly yield to a smart undergraduate. I hadn't seen anything like it—and I never will again.

The other thing that drew us—or so I thought—was an idealistic vision that we were doing something to help our country. I knew enough about history to have shed the notion that it was ungentlemanly to read your enemy's mail. And once I was on the inside, I saw plenty of ways that the agency was having an effect on national security. Even as a rookie, I felt I had a chance to make a difference in some small way. Some of the veteran mathematicians whom we met had clearly had a palpable effect on the security of the United States, legends almost completely unknown outside of our own club.

where are they now?


cnn | So how did it happen that this woman, once unknown beyond the social set in Tampa, Florida, saw her reputation allegedly destroyed by anonymous government officials?

Attorney Alan Charles Raul, who is representing the Kelleys', explains the mess started in May 2012, when four-star General John Allen began receiving e-mails from "kelleypatrol@gmail.com."

"The position Mr. and Mrs. Kelley are in today is not something they asked for. They came forward to do the right thing, and everything that was unleashed from that point forward was a result of the government's lack of of restraint in protecting the privacy and dignity of the victims here," said Raul.

According to the Kelleys' lawsuit, the e-mail disparaged Jill and referred specifically to her and the General's individual private schedules.

The suit also claims e-mails sent by Petraeus' mistress Paula Broadwell were then sent to the Kelleys under the alias "Tampa Angel."

The messages made reference to private information, leading the couple to believe they were being followed.

The Kelleys claim the messages also threatened them with "embarrassment for all, including spouses, such as info in national headlines."

Jill Kelley reached out to a friend in the FBI, and an investigation was launched.

The Kelleys assert that Jill gave FBI investigators permission to view just one bothersome e-mail in the couple's account, but they kept pressing for access to others, and "searched, obtained, and reviewed personal, irrelevant private e-mails belonging to the Kelleys."

"If there's a case study, if next year, the Department of Justice does training on victim witness assistance and protection, really the poster child case of how not to do it is how Mrs. Kelley and Dr. Kelley were treated in this instance," said Raul.

One Ring to rule them all, One Ring to find them, One Ring to bring them all and in the darkness bind them


wsj | The NSA is focused on collecting foreign intelligence, but the streams of data it monitors include both foreign and domestic communications. Inevitably, officials say, some U.S. Internet communications are scanned and intercepted, including both "metadata" about communications, such as the "to" and "from" lines in an email, and the contents of the communications themselves.
Much, but not all, of the data is discarded, meaning some communications between Americans are stored in the NSA's databases, officials say. Some lawmakers and civil libertarians say that, given the volumes of data NSA is examining, privacy protections are insufficient.

Sen. Ron Wyden, an Oregon Democrat, in 2012 sought but failed to prohibit the agency from searching its databases for information on Americans without a warrant. He has also pushed intelligence agencies to detail how many Americans' communications have been collected and to explain whether purely domestic communications are retained in NSA's databanks. They have declined.

"Technology is moving us swiftly into a world where the only barriers to this kind of dragnet surveillance are the protections enshrined into law," Mr. Wyden says.

This month President Barack Obama proposed changes to NSA surveillance to improve oversight. Those proposed changes wouldn't alter the systems in the U.S. that NSA relies upon for some of its most sensitive surveillance.

The systems operate like this: The NSA asks telecom companies to send it various streams of Internet traffic it believes most likely to contain foreign intelligence. This is the first cut of the data.
These requests don't ask for all Internet traffic. Rather, they focus on certain areas of interest, according to a person familiar with the legal process. "It's still a large amount of data, but not everything in the world," this person says.

The second cut is done by NSA. It briefly copies the traffic and decides which communications to keep based on what it calls "strong selectors"—say, an email address, or a large block of computer addresses that correspond to an organization it is interested in. In making these decisions, the NSA can look at content of communications as well as information about who is sending the data.
One U.S. official says the agency doesn't itself "access" all the traffic within the surveillance system. The agency defines access as "things we actually touch," this person says, pointing out that the telecom companies do the first stage of filtering. 

The surveillance system is built on relationships with telecommunications carriers that together cover about 75% of U.S. Internet communications. They must hand over what the NSA asks for under orders from the secret Foreign Intelligence Surveillance Court. The firms search Internet traffic based on the NSA's criteria, current and former officials say.  Fist tap Arnach.

Wednesday, August 21, 2013

after the bully-boys start kicking in your door and breaking your stuff, where does it end?


if you're not with the all-seeing eye, then you're against the all-seeing eye...,


NYTimes | Mr. Rusbridger said that two months ago he was contacted by “a very senior government official claiming to present the views of the prime minister,” David Cameron. There were two meetings in which officials “demanded the return or the destruction of the material we were working on,” and in other meetings, he said, officials said: “You’ve had your fun, now we want the stuff back,” and, “You’ve had your debate, there’s no need to write any more.” 

The officials then threatened legal action to obtain the documents. Then two security experts from Britain’s Government Communications Headquarters, known as G.C.H.Q., the counterpart to the American National Security Agency, came to oversee the destruction of hard drives in The Guardian basement by Guardian executives, Mr. Rusbridger said. 

He called it “one of the most bizarre moments in The Guardian’s long history.” 

Efforts to prevent publication of Snowden-related material began on June 7, when defense officials issued a confidential notice to newspapers and broadcasters in an attempt to limit the coverage of Mr. Snowden’s revelations about surveillance tactics employed by intelligence agencies in Britain and the United States. 

Editors were reminded not to publish information that could “jeopardize both national security and possibly U.K. personnel.” The notice followed The Guardian’s first publication of details of the American intelligence-gathering program called Prism. 

Now, it is not just the opposition Labour Party that is questioning the use of the terrorism laws in this case to seize material intended for journalism, which in countries like the United States would be under more legal protection. David Davis, a Conservative member of Parliament, said that the responses of the Home Office fail “Logic 101.” 

“’If you’re not on our side, you’re on the side of the terrorists,’ is what they’re trying to say,” Mr. Davis said. 

Robert Wintemute, a professor of human rights law at King’s College, London, said that “I hope this is an aberration rather than a signal of a wider clampdown” on press freedom and human rights. “I do think Greenwald and Miranda should bring this to court, because winning in court will rein in the government’s powers,” he said.

that didn't take long - keep moving, nothing over here to see...,



sfgate | San Francisco's fire chief has explicitly banned firefighters from using helmet-mounted video cameras, after images from a battalion chief's Asiana Airlines crash recording became public and led to questions about first responders' actions leading up to a fire rig running over a survivor. 

Chief Joanne Hayes-White said she issued the order after discovering that Battalion Chief Mark Johnson's helmet camera filmed the aftermath of the July 6 crash at San Francisco International Airport. Still images from the footage were published in The Chronicle.

Filming the scene may have violated both firefighters' and victims' privacy, Hayes-White said, trumping whatever benefit came from knowing what the footage shows.

"There comes a time that privacy of the individual is paramount, of greater importance than having a video," Hayes-White said.

Critics, including some within the department, questioned the chief's order and its timing - coming as Johnson's footage raised the possibility of Fire Department liability in the death of 16-year-old Ye Meng Yuan. Fist tap Dale.

is the establishment's fourth estate getting out of pocket?



Guardian | The detention of Miranda has rightly caused international dismay because it feeds into a perception that the US and UK governments – while claiming to welcome the debate around state surveillance started by Snowden – are also intent on stemming the tide of leaks and on pursuing the whistleblower with a vengeance. That perception is right. Here follows a little background on the considerable obstacles being placed in the way of informing the public about what the intelligence agencies, governments and corporations are up to.

A little over two months ago I was contacted by a very senior government official claiming to represent the views of the prime minister. There followed two meetings in which he demanded the return or destruction of all the material we were working on. The tone was steely, if cordial, but there was an implicit threat that others within government and Whitehall favoured a far more draconian approach.

The mood toughened just over a month ago, when I received a phone call from the centre of government telling me: "You've had your fun. Now we want the stuff back." There followed further meetings with shadowy Whitehall figures. The demand was the same: hand the Snowden material back or destroy it. I explained that we could not research and report on this subject if we complied with this request. The man from Whitehall looked mystified. "You've had your debate. There's no need to write any more."

During one of these meetings I asked directly whether the government would move to close down the Guardian's reporting through a legal route – by going to court to force the surrender of the material on which we were working. The official confirmed that, in the absence of handover or destruction, this was indeed the government's intention. Prior restraint, near impossible in the US, was now explicitly and imminently on the table in the UK. But my experience over WikiLeaks – the thumb drive and the first amendment – had already prepared me for this moment. I explained to the man from Whitehall about the nature of international collaborations and the way in which, these days, media organisations could take advantage of the most permissive legal environments. Bluntly, we did not have to do our reporting from London. Already most of the NSA stories were being reported and edited out of New York. And had it occurred to him that Greenwald lived in Brazil?

The man was unmoved. And so one of the more bizarre moments in the Guardian's long history occurred – with two GCHQ security experts overseeing the destruction of hard drives in the Guardian's basement just to make sure there was nothing in the mangled bits of metal which could possibly be of any interest to passing Chinese agents. "We can call off the black helicopters," joked one as we swept up the remains of a MacBook Pro.

Whitehall was satisfied, but it felt like a peculiarly pointless piece of symbolism that understood nothing about the digital age. We will continue to do patient, painstaking reporting on the Snowden documents, we just won't do it in London. The seizure of Miranda's laptop, phones, hard drives and camera will similarly have no effect on Greenwald's work.

The state that is building such a formidable apparatus of surveillance will do its best to prevent journalists from reporting on it. Most journalists can see that. But I wonder how many have truly understood the absolute threat to journalism implicit in the idea of total surveillance, when or if it comes – and, increasingly, it looks like "when".

We are not there yet, but it may not be long before it will be impossible for journalists to have confidential sources. Most reporting – indeed, most human life in 2013 – leaves too much of a digital fingerprint. Those colleagues who denigrate Snowden or say reporters should trust the state to know best (many of them in the UK, oddly, on the right) may one day have a cruel awakening. One day it will be their reporting, their cause, under attack. But at least reporters now know to stay away from Heathrow transit lounges.

Tuesday, August 20, 2013

chasing status in public and neglecting your own....,


journeyman | "By the age of 20, the average westerner has seen one million commercial messages." With this kind of exposure, it is impossible to live in the modern world without being a product of consumer society. Now psychologists, like Geoffrey Miller, are saying that it is distorting the way we interact with the world and each other: "We've all kind of gone collectively psychotic".

Evolutionary theory says we are indistinct from animals and so have two primary subconscious motives: survival and attracting a mate. As modern society has taken care of our survival, "we spend more time thinking about social and sexual issues than any animal has had the luxury of doing in the history of life on Earth". According to scientists this has led to an obsession with 'prestige' or our rank in society, something that in consumer society has become synonymous with consumption. "The principal way you're supposed to display your mental traits now is through your purchases." 

Manipulating our innermost impulses, capitalism has begun to not only reflect our evolutionary tendencies but also to amplify and distort them. Creating an environment in which consumption takes the place of traditional human interaction, "consumers are neglecting to develop the crucial naturally romantic traits, saying instead, 'I've got a Porsche out front'".  Yet this capitalist system, which fits so neatly with our animalistic traits, is not making us happy.

One of the great conundrums is that in an age of plenty, addictions, depression and mental health issues are becoming part of everyday conversation. The obsession with our place in society has led us to, "squander this golden age on silly anxieties." In the long term the individual and psychological cost of modern culture is relatively small. The environmental cost on the other hand could ultimately destroy life, as we know it. "It's becoming increasingly clear that the kind of growth rates that we are getting around the world are not sustainable", says Tim Cooper, a professor of Sustainable Design and Consumption. Measures taken to try and mitigate the impact of modern life, such as transition towns, recycling, alternative power and enduring design are not dealing with the root cause, only attacking symptoms. So for the moment we must endure this strange society that is making us all so unhappy. Our only hope is that it may only be a temporary illness: "I actually think runaway consumerism is a temporary historical glitch. I think we'll grow out of it." Exploring how human psychology has moulded the society that is slowly destroying the world and us, 'Consumed' takes us inside both the apocalyptic and redemptive sides of the human condition.  Fist tap Dale.

is wikileaks bluffing or did it just post all the goods on facebook?


rsn | omeone remind WikiLeaks that the U.S does not respond well to blackmail.

We'd think this was some kind of interactive Internet mystery if we didn't know better, but in fact WikiLeaks has released about 400 gigabytes' worth of mysterious data in a series of encrypted torrent files called "insurance." And no one can open it.

With nothing better to go on, the Internet has decided that "insurance" may be code for "back off" to the U.S. government - coming just before the sentencing of WikiLeaks cause célèbre Bradley Manning.

File encryption means that the data is hidden and no one can see what's in the shared files without a key to unlock them - which, of course, hasn't been publicly released.

The size of one of the files is 349 gigabytes, which means that there's either A) enough textual data inside to power a nationwide security crisis for the next 300 years or so, or B) a few very incriminating pieces of video footage.

"I'm getting the feeling these people are spreading some serious material," commented Facebook onlooker Angel Gabriell.

WikiLeaks abruptly released the files and asked the public to mirror them - on Facebook and Twitter, no less, hardly the place you go to drop off highly classified intelligence.

But the most popular theories between the comments of Facebook, Reddit, and Hacker News, are that the data contains information about the identities of U.S. secret agents currently serving around the world. 

WikiLeaks has always anonymized the names of any agents associated with the data in its leaks in order to protect their identities. But with a filename like "Insurance," a few people are betting that the website is preparing for a fight with any governments who want to keep its info out of the hands of the public.

Fuck Robert Kagan And Would He Please Now Just Go Quietly Burn In Hell?

politico | The Washington Post on Friday announced it will no longer endorse presidential candidates, breaking decades of tradition in a...