"UPDATE: Dan Froomkin echoes, and elaborates on, several of the points here, in his Huffington Post piece entitled: "Ruling Against Bush Wiretaps Also Slaps Down Obama's Executive Overreach." He writes: "the ruling should serve as a wake-up call to those who thought that the days of executive overreach were behind us."
And Charlie Savage and Jim Risen have a new NYT article which, in the course of discussing whether the Obama DOJ will appeal this decision, examine the likely motives and goals of the Obama administration here, none of which reflect well on them at all."
Friday, April 2, 2010
The criminal NSA eavesdropping program
Thursday, April 1, 2010
Waking Up Orwell: the lost & desert island episodes
Wednesday, March 31, 2010
Suspicious Activity Reporting (SAR) Inititative criminalizes non-criminal acts at random
"At it's core pre-emptive policing severely undercuts the basic notion that police are public servants sworn to protect and serve, rather than intelligence agents whose job is to feed daily observations into data streams winding their way into a nationwide matrix of Fusion Centers and federal agencies. The SAR Inititave casts a wide net of surveillance: it encourages local police, the public, and corporations and businesses to engage in vaguely-defined "pre-operational surveillance" and report actvities such as the practive of religion and spirituality, political protest, and community organizing will weaken civil liberties and erode community trust."
- Thomas Cincotta, Platform for Prejudice
Tuesday, March 30, 2010
Camera Fraud: "Audit the cameras"
BIMA: biometric policy coming to an agency near you
As of last week, there is now a U.S. Government national security agency called the Biometrics Identity Management Agency (BIMA). It supersedes a Biometrics Task Force that was established in 2000.
Though nominally a component of the Army, the biometrics agency has Defense Department-wide responsibilities.
“The Biometrics Identity Management Agency leads Department of Defense activities to prioritize, integrate, and synchronize biometrics technologies and capabilities and to manage the Department of Defense’s authoritative biometrics database to support the National Security Strategy,” according to a March 23 Order (pdf) issued by Army Secretary John M. McHugh that redesignated the previous Biometrics Task Force as the BIMA.
Biometrics is generally defined as “a measurable biological (anatomical and physiological) [or] behavioral characteristic that can be used for automated recognition.”
“Biometric data [are] normally unclassified,” according to a 2008 DoD directive (pdf). “However, elements of the contextual data, information associated with biometric collection, and/or associated intelligence analysis may be classified.”
“Biometrics-enabled Intelligence [refers to] intelligence information associated with and or derived from biometrics data that matches a specific person or unknown identity to a place, activity, device, component, or weapon that supports terrorist / insurgent network and related pattern analysis, facilitates high value individual targeting, reveals movement patterns, and confirms claimed identity.”
“Biometrics is an important enabler that shall be fully integrated into the conduct of DoD activities to support the full range of military operations,” the 2008 directive stated.
“Every day thousands of [biometric] records are collected and sent to the Department of Defense (DOD) Automated Biometric Identification System (ABIS) to store and compare against existing records,” a 2009 DoD report (pdf) said. “The technology is improving such that a submission from theater [e.g., in Afghanistan] can be searched in the DOD ABIS and a response sent back to theater in less than two minutes.”
“Realtime positive identification of persons of interest enables Coalition forces to target, track, and prosecute known or potential adversaries,” the DoD report said.
Monday, March 29, 2010
NSI: New suspicious activity reporting affects anyone, doing anything, at any time
incidents to enable rapid identification and mitigation of potential terrorist threats.1 The resulting NSI business process (often referred to as the NSI cycle) was described by the Program Manager for the Information Sharing Environment (PM-ISE) in a Concept of Operations for the NSI published in December 2008 and in a revised functional standard in May 2009." - ISE.gov
Sunday, March 28, 2010
A Data Bill and a Transparency Caucus
HEALTHCARE: Outsourcing your public health records to India
Anticipating these opportunities it appears some Indian IT companies had started gearing up even while the Bill was being debated. For instance Wipro Technologies, another major Indian IT company, claims that besides EHR, it has already started working on related IT applications to provide remote managed services, interoperability testing, digitization of medical records, and integration of EHR and public health records.c/o International Beat, Indrajit Basu
The passage of Obama's healthcare reforms Bill, which aims to ensure millions -- 32 million according to Congressional Budget Office estimate -- uninsured Americans get medical coverage may be US's most sweeping health-care legislation in four decades. But while it rewrites the rules governing the world's largest medical industry, America's healthcare sector predicts that it will have to struggle to overhaul its IT systems in order to be ready for the ensuing healthcare reforms.
What's more; while US's healthcare IT is gearing up for a long-drawn mission to tackle extensive and expensive solutions, the Indian IT sector is looking forward to a multibillion-dollar opportunity from the legislation, which is "historic" according to many.
The bill that expands coverage to Americans who were so far been unable to afford medical insurance, is expected to bring in major changes in the medical insurance sector forcing them to overhaul their systems.
The sector would have to throw money, people and technology in order to prepare for the changes, say sources. "Consequently, a huge opportunity has opened up for the Indian IT outsourcing sector that already plays a significant role providing IT services to the US healthcare industry," says a spokesperson of Infosys Technologies, the Nasdaq-listed Indian IT company, which is one of the largest IT outsourcing service provider.
India's money-spinning IT outsourcing sector that earns close to $40 billion a year in providing IT outsourcing service to the US, reckons that Obama's plan would need at least $20 billion to be spent of healthcare IT alone. Most of this money is expected to be spent of creating Electronic Health Records (EHRs) for all Americans by 2014.
Traditionally the American healthcare IT has been relatively slow in adopting technology, which has often come as a problem in upgrading its healthcare systems. But the new Bill would require a lot of automation in the healthcare system which means that the sector would have to integrate systems and create cutting edge technology-driven healthcare applications.
It would also require solutions to assist the US healthcare industry to prevent leakages and reduce costs and waste.
"That means trickling down of opportunities to Indian IT companies in the form of long-term partnerships with the US healthcare industry," said another industry source.
Anticipating these opportunities it appears some Indian IT companies had started gearing up even while the Bill was being debated. For instance Wipro Technologies, another major Indian IT company, claims that besides EHR, it has already started working on related IT applications to provide remote managed services, interoperability testing, digitization of medical records, and integration of EHR and public health records.
Besides, a significant amount of business is anticipated from enrollments, claims processing and providing customer services with technology and tools.
The Bill is indeed set to change the face of healthcare delivery in the US. Besides focusing on extending healthcare to American citizens, it also aims at streamlining the entire administrative system to drastically cut the nation's healthcare cost.
Thus, services such as finance and accounting, research and analytics will be high in demand as well since these too help in reducing cost and increase efficiency, say experts.
Why if WikiLeaks loses their rights, so do we.
WikiLeaks is under attack by several governments, including our own, for releasing public interest information embarrassing to our National Security State. It's people are followed and believe their lives are in danger, its web site has been hacked, and WikiLeaks is being threatened, with the official newspaper of the empire, the New York Times, telling us "To the list of the enemies threatening the security of the United States, the Pentagon has added WikiLeaks.org. - Liberty Underground
c/o Salon.com, Glenn Greenwald
A newly leaked CIA report prepared earlier this month (.pdf) analyzes how the U.S. Government can best manipulate public opinion in Germany and France -- in order to ensure that those countries continue to fight in Afghanistan. The Report celebrates the fact that the governments of those two nations continue to fight the war in defiance of overwhelming public opinion which opposes it -- so much for all the recent veneration of "consent of the governed" -- and it notes that this is possible due to lack of interest among their citizenry: "Public Apathy Enables Leaders to Ignore Voters," proclaims the title of one section.
But the Report also cites the "fall of the Dutch Government over its troop commitment to Afghanistan" and worries that -- particularly if the "bloody summer in Afghanistan" that many predict takes place -- what happened to the Dutch will spread as a result of the "fragility of European support" for the war. As the truly creepy Report title puts it, the CIA's concern is: "Why Counting on Apathy May Not Be Enough" ::: View Complete Article Here:::