by PAUL JOSEPH WATSON | NOVEMBER 3, 2014
#AceMedaiNews says according to #MediaSources the question being asked is ……… did Facebook user Anthony Ditirro like the USA Today Facebook page, or didn’t he? Perhaps the answer will emerge during court proceedings, as the Colorado resident filed a lawsuit against the social network, seeking class-action status, and claiming that Facebook falsified likes for advertising purposes, CNET reported. According to the suit, as reported by CNET, Ditirro appeared in at least one sponsored story, brought to his attention by one of his friends.
A transcript of the video message is below:
Across Britain, it’s that time again when the dark nights of winter are lit up with the bright lights of Diwali.
And I would like to wish everyone taking part in these celebrations, both in this country and around the world, a happy Diwali and a prosperous new year.
One of the most important dates in the Hindu calendar, Diwali is a festival that marks the triumph of good over evil and light over darkness. And it has become the focus of joyous celebrations in many of our local communities, with people of all faiths and none, coming together for dancing, music and fireworks.
These festivities represent some of the biggest Diwali celebrations to be found outside of India, and reflect the powerful and ongoing contribution of Britain’s Hindu, Sikh, Jain and Buddhist communities to every area of our national life.
So whether you’re at home with family and friends, or you’ve been taking part in Diwali events on the Belgrave Road in Leicester, in Trafalgar Square, or elsewhere in the United Kingdom – wherever you are and whatever your faith – have a wonderful time.
- Festival of Lights – Diwali (anekhaa.wordpress.com)
- The Not so complicated Story of Diwali in 3 minutes (thevastnothing.wordpress.com)
- First Diwali In Congress Celebrated On Capitol Hill (PHOTOS) (huffingtonpost.com)
- Celebrating Diwali outside India (morevisas.com)
- Happy Diwali, the Festival of Lights! (aceishop.com)
October 1st: 8:00am – 12:00noon IST
October 2nd: 8:00am – 12:00noon IST
October 3rd: 8:00am – 12:00noon ISTFor times in your region 8:00am IST on September 30th in Dharamsala, India is the same as 3:30am BST on September 30th in London, England; and 7:30pm PDT on September 29th in Los Angeles, California, USA.
Photo of His Holiness the Dalai Lama speaking at a question and answer session during teachings requested by a group of Buddhists from Taiwan at the Main Tibetan Temple in Dharamsala, India on October 4, 2012. (Photo by Tenzin Choejor/OHHDL)
- Dalai Lama: Medical Pot OK, But Not for ‘Crazy Mind’ (newser.com)
- Dalai Lama and Nobel Laureates Call for End to Nuclear Weapons (voatibetanenglish.com)
- Dalai Lama to visit Emory University (sfgate.com)
- Mexican officials won’t meet Dalai Lama: Tibetan group (sinodaily.com)
- New Comic Book About His Holiness the Dalai Lama by Vijay Kranti (guhyasamajacenter.wordpress.com)
- His Holiness The Dalai Lama (twentyfirstcenturynomad.com)
- Dalai Lama Responds to Ai Weiwei’s Question, “Do You Hope to Return to Your Native Land?” (complex.com)
- Live Webcasts – Dalai Lama – New York (acenewsservices.com)
I saw this video today on YouTube and just had to provide a post, about the discipline applied in certain schools in the US and before you watch ,it is very graphic and may upset certain people!
The fact that “Special Needs Children” are being locked up for hours on end to be able to teach them a lesson, defies all morality!
At 5:06, the kids themselves describe their own experiences. That should be all you need to hear to understand something is seriously wrong here.
WARNING: This video includes disturbing scenes involving children.
- About Parenting….. (oldmanwisdommanny.wordpress.com)
- #Syria’s children are in danger of becoming a… (acenewsservices.com)
- Something Sickening Is Happening To Some Of Our Schoolchildren, And You Probably Have No Idea [VIDEO] (secretsofthefed.com)
We are two years into a process that began in London in 2011 to address one of the greatest challenges facing our generation: building a new international consensus on the future of cyberspace. There is more that unites us as nations than divides us on this issue. We all want to benefit from secure and reliable access to the internet as a driver of growth, development, good governance and innovation in our societies, and to protect our citizens from crime and terrorism on-line.
But there is a divide emerging in the international community that we must confront.
On one side are countries like the UK and many others like Korea who argue that the internet must remain open and borderless, and benefit from collective oversight between governments, international organisations, industry and civil society. In our view this is the only way to ensure that the benefits of the digital age are expanded to all countries; that ingenuity and competition flourish and investment and enterprise are rewarded; and that the creativity that spurs economic growth is nurtured not stifled by excessive regulation.
On the other side are countries calling for an international legal framework for the internet that would enable governments to exercise exclusive control over the Internet’s content and resources.
I am convinced that placing the controls of cyberspace entirely in the hands of governments would be a drastic error that would have profound social and economic consequences. The dead hand of state control would be as stifling for the internet as it has been for many economies in the past. It would erect barriers that impede the free flow of ideas, and would lead to a ghettoized or two-tier cyberspace that hinders free trade and holds back economic growth and development. This world of closed, fragmented Internets would certainly be less free and democratic – but it would also be less creative, less innovative, less progressive and, ultimately, less prosperous than a world with a single and open Internet.
The Internet is the heartbeat of the global economy, linking businesses that are based thousands of miles apart and constantly creating new markets, industries and technologies. Over the last 5 years, it has accounted for one fifth of GDP growth in advanced economies, with vast potential for future growth in countries where many people are now coming online for the first time.
It provides an environment where ideas flourish and barriers to market entry are removed, enabling innovators and entrepreneurs in every corner of the globe to turn those bright ideas into financial gain. It is improving the delivery of public services such as health and education, which heighten the skill and efficiency of workforces the world over.
It is facilitating the development of smart grids, smart buildings and smart cities, which support green and sustainable growth.
And it is creating more attractive investment climates by widening accountability and increasing transparency.
For these reasons, and more, societies that embrace an open and vibrant internet will be the ones that develop and prosper most in the 21st century.
And let us be clear – human rights apply online as much as they do offline. We should have no illusions about the motivation of those who call for a regulated internet stem from a desire to control the expression and curtail the political freedoms of their citizens.
We do all face sophisticated and persistent threats in cyberspace from terrorists or organised criminals. We will not compromise on the United Kingdom’s security or give free rein in cyberspace to those who wish to harm our country. With my full support our security and intelligence agencies will continue to address threats in cyberspace and to help our allies and partners to do the same – and the UK will remain at the centre of the debate on how we tackle those threats more effectively. But countries who seek to hide behind firewalls and erect artificial barriers on the internet will ultimately reduce their security, not enhance it. A fragmented Cyberspace would reduce trust and cooperation, making malicious or subversive activity more likely and harder to detect.
So our challenge is to work together to build confidence and engrain norms of behaviour which govern state behaviour online and support our collective security, while upholding the values of openness and freedom which have been integral to the success of the internet and are our core values as democratic nations.
We need a more transparent and inclusive model of governance; one where no single body controls all of the functions that govern the Internet; which is flexible, adaptable and can keep pace with the lightning speeds at which technology is advancing.
The London process, a process that began two years ago, is designed to achieve that objective and we have made some important progress:
We have brought the debate on the future of cyberspace to the front of the international agenda. We have taken strides towards agreeing principles that can form the basis of widely accepted norms for behaviour in cyberspace, which are captured in the “principles and guidelines” document put forward by Korean hosts. And we are making progress on capacity building to help all states tackle challenges in cyberspace. In the UK, this includes the establishment of the Global Cyber Security Capacity Centre which will open in Oxford next month and help other countries to build their own resilience and security.
Nevertheless, we have still not reached agreement on international ‘rules of the road’ or set of standards of behaviour.
To all those states that are uncertain where their interests lie between these competing visions of the future of cyberspace, I say that there is no stark choice between an open Internet and a secure Internet. But there is a choice between an Internet which continues to create growth and prosperity on all continents, and one which does not. We must agree to take steps to increase the confidence and trust that governments, companies and citizens all have in the Internet while preserving its transformative dynamism and creativity.
At a time of such global economic uncertainty, making the wrong choice would have profound consequences for the future. We must come together and ensure that the Internet is not only secure, but remains an engine for progress all over the world.
- Accountability in cyberspace must: Sibal (hispanicbusiness.com)
- How Britain’s new cyberarmy could reshape the laws of war (washingtonpost.com)
- Naval War College professor discusses cyber warfare (dailytrojan.com)
- You are only secure till you are attacked, says Kapil Sibal at the Cyber Security conference (dnaindia.com)
- Seoul to host largest international gathering on cyberspace (gregorydevans.wordpress.com)
- Press release: Foreign Secretary calls for open internet that spurs economic growth (gov.uk)
- India opposed to controls over Internet for cybersecurity (zdnet.com)
- Professorial Lecture: The Future of Cyberspace 30/11/11 (travelsinvirtuality.typepad.com)
- India opposed to controls over Internet for cybersecurity (zdnet.com)
- Professorial Lecture: The Future of Cyberspace 30/11/11 (travelsinvirtuality.typepad.com)
FIRST VIDEO: Snowden receives Sam Adams Award in Moscow
Edited time: October 12, 2013 18:09
The first videos of NSA whistleblower Edward Snowden have surfaced since he received asylum in Russia. The footage, provided by WikiLeaks, was taken during the Sam Adams Associates for Integrity in Intelligence awards ceremony.
The video fragments of a meeting, attended by the former CIA analyst Ray McGovern, former NSA executive Thomas Andrews Drake and former FBI agent Coleen Rowley, Jesselyn Radack of the Government Accountability Project, and Sarah Harrison of WikiLeaks – all whistleblowers in their own respects – were released by WikiLeaks on Friday.
In the first video appearance since he was granted asylum in Russia, Snowden spoke about US government transparency and dangers to democracy caused by the NSA mass spying programs.
“This is not about any sort of particular program, this is about a trend in the relationship between the governing and the governed in America,” Snowden said speaking about the government transparency situation in the US. “That is increasingly coming into conflict with what we expect as a free and democratic people. If we can’t understand the policies and the programs of our government, we cannot grant our consent in regulating them.”
“As someone very clever said recently, we don’t have an oversight problem in the US we have an undersight problem.”
The problem has grown up to a point where Americans have “an executive, the Department of Justice, that’s unwilling to prosecute high officials who lied to Congress and the country on camera but they’ll stop at nothing to prosecute someone who told them the truth,” Snowden added.
- Edward Snowden receiving Sam Adams award in Moscow (slothed.com)
- Video: Edward Snowden wins Sam Adams award – WikiLeaks release (wikileaks-forum.com)
- New Videos of Edward Snowden Receiving Sam Adams Award (antiwar.com)
- Edward Snowden Is the Samuel Adams of Our Time (theburningplatform.com)
Readers: This is the first of my guest related news posts that will be added on a regular basis to our news site, this is not always our view of the news or opinion of the writers posts ,but we will be featuring various articles of interest as they are sent to our news-desk. Should you have anything of interest, please post it on an available link as this was and we will be pleased to feature them accordingly. Providing they comply with our “Terms and Conditions of Service” A copy of which will be supplied upon request!
Regards, Editor – Ace News Group
The NSA (National Security Agency) isn’t good enough to be that bad. You try to hire 10,000 +/- highly trained cyber trackers. About as easy as hiring 10,000 professional airport security folks. So don’t wring your hands over how much they know about you. It could be worse. They could know what they’re doing. They just need a better name, a better charter for existence, a better pitch. We came up with the solution to all the complaining. When it is done, they’ll be your BFF (Best Friend Forever).
Of course if you want to share this with others, GREAT!!!
NSA Just Needs a Better Name, New Service Offerings
“Okay, now your servers are down because of a power surge, a grid malfunction, or maybe even a bomb. Now, if the intruder tries to reboot your servers or access the data, he’ll always hit this screen.” – Max Peterson, “The Echelon Conspiracy,” Dark Castle Entertainment, 2009
They’re scrounging through all the information that just happens to pass their way to find something of interest, something useful.
Okay, they’re a little different because they don’t sell the information to the highest bidder. They store the stuff for later when they can figure out what to do with it.
Yes, they do have a broader area to search; but then, they aren’t in it just for the money.
For that matter, they aren’t doing much more than every government in every country is doing.
In London, it’s estimated that Brits are captured on photos and video 300 times a day by cameras mounted throughout the city. Their intelligence service even got so creative as to monitor dumpsters, but that came to an end.
It wasn’t because citizens promised to do a better job of recycling; someone just determined it was a really dumb idea.
Mossad, MI5, Italy’s P2, India’s IB, Russia’s RAW, Japan’s PSIA, China’s MSS and their brethren around the globe constantly monitor and analyze communications, internal and external.
Oh heck face it all of the governmental “legal” agencies are there to catch the bad guys/gals and keep you on the straight-and-narrow.
You, not them!
They usually follow Raymond Burke’s advice, “Don’t get caught.”
Weather Plus – Thousands of satellites circle the globe constantly to check the weather and other things like the volumes of communications that are being constantly sent by people through service providers and sites. They help minimize malware infection and other problems. The automated systems and their managers just hate it when you encrypt the files/communications.
If you think the U.S.’s anti-terrorism laws give agencies like the NSA too much freedom to search online files … think again.
In today’s environment, all of these protection organizations occasionally get carried away with their work.
It isn’t hard for them to repeat what Max Peterson said, “Relax, I’m a professional.”
Just remember, they went from zero to 10,000ish big data researchers/analysts in 3-6 months much like the TSA (Transportation Security Agency) went from zero to 10,000ish highly trained travel protection agents in 30-90 days.
On the other hand, it isn’t as though people make it very difficult for them.
iNet Minute – People love how online services enable them to communicate with folks around the world and, more importantly, talk about themselves on a growing number of social media sites. The web has become such a popular means of expression that it has become a fire hose of documents, data, information.
True, I’m really not that into your hourly Facebook posts/Likes/dislikes, daily Linked professional conquests, minute-by-minute Tweets or any of the other free-to-express-yourself social media activities that are available to all of us.
Police agencies have found some folks postings very interesting.
Divorce lawyers love it when the guy (or gal) brags about his/her “outside activity.”
In other words, some folks just can’t express themselves enough!
That’s what got agent Grant fired when he posted on his boss’ Facebook page, “I’m impressed. I always thought you were a little stupid.”
Share, Share Alike – Pre-teens, teens and Gen Yers who grew up on the iNet/web simply feel that sharing most or all of their information is just practical and logical. The open communications has spread to almost every generation and nationality.
It’s interesting that a number of social media research reports have found that a large number of people felt that what they posted on social media sites or put up in the soft, puffy cloud was not admissible in court and could not be used against them.
It can … it is!
Actually, the NSA and security folks don’t grab all of that stuff out of the clouds.
No, they go to where all that information rests – the data centers where it’s stored.
Knock on the door and …
Storage in the Cloud – While people always refer to storing their stuff in the cloud, they need to also understand that the cloud storage facility is a real building. These silos of documents, information, images/photos are where social media services and other organizations store and mine all the best possible data.
All those data centers poke into the cloud but are firmly planted on the ground around the globe.
They won’t tell you exactly where the cloud storage facility is located, but it doesn’t take a rocket scientist to find them.
Just look for places where there is ample, cheap power and favorable taxes and BAM!
The really big data centers need huge amounts of power to run the servers/storage and keep them cool.
All of the shared information creates a terrific strain on the computers, SSDs and hard drives to store and share your stuff.
None of that was something the NSA had expected or knew how to deal with.
Overblown – Like a tidal wave of dust sweeping across the plains, the NSA receives more information, more content, more stuff than any person, any machine could sift through and scrutinize. The best thing they can do is stream it to hard drives and store them deep in a mountain until they have a free moment. Until then, they glance at less than .00004 percent of the world’s iNet traffic.
Right now, they store the stuff on HDs and ship them to a mountain cave until they can figure out what to do with the stuff they might use … some day.
So what they really need is a better name, a better mission statement.
The new name? National Storage Agency (won’t have to change the initials on their coffee cups).
Then pitch themselves as the country’s corporate and personal storage service and add a service that will have people standing in line around the block – free, automatic backup of your devices/drives.
Most folks don’t backup their drives until it’s too late. Their new free service will automate/handle the job for you.
They could say they are only following Max Peterson’s guidance, “Oh yes, just in case.”
Then, they can contract with the social media and online storage companies to hold all the stuff for you … and them.
The NSA is no longer an electronic spying operation. And the cloud companies that do the best job of storing, finding, retrieving information about you will give them huge government contracts.
Everyone wins … problem solved!
All they have to do is remember what Max Peterson told them, “This is your BIOS-level password. Without it, nothing works in this room.”
Oh heck, put it on a Post-It on your monitor like everyone else!
Here’s the link (you may have to copy/strip in or ping us) — https://docs.google.com/document/d/1SyZFTkqQGxHGPdAGshwc6g0aqlW_wNIJxi2E3UoQyA4/edit?usp=sharing
Use it as you want with or without attribution.
- Private Data Gatekeeper Stands Between You and the NSA (newscientist.com)
- Anti-virus software founder John McAfee says he has the answer to NSA internet intrusion (familysurvivalprotocol.com)
- How the NSA identifies Tor users in 6 easy steps (dailydot.com)
- NSA targeted Tor via Firefox flaw (bbc.co.uk)
- #NSA Tracks Google Ads – Using A Little Jiu-jitsu – To Find Tor Users (aceishop.com)
- Skype under investigation over NSA links (neowin.net)
- NSA surveillance revelations prompt EFF resignation from Global Network Initiative (NetworkWorld Security) (networkworld.com)
The Jewish-Roman historian Josephus wrote that Jish was the last city in the Galilee region to fall to the Romans in the first Jewish war (66-73 CE)–but it remained a large Jewish village (known as Gush Halav) until as late at the 15th century.
Since that time, the population of Jish has changed repeatedly both as a result of natural factors (an 1837 earthquake destroyed the city) and strife–with Jews, Christians, and Muslims coming and going. Today, the population is 55% Maronite Christian, 35% Greek Orthodox, and 10% Muslim.
The demography of the town is interesting enough, but what is unique about the town is language. Though everyone is the town speaks Hebrew and Arabic, the older Maronites in Jish still speak Syriac Aramaic–the ancient Semitic language that belongs to the same family as Hebrew.
Aramaic was the language of the parts of the Tannach (such as passages in the books of Daniel and Ezra), but it is most commonly identified as being the language spoken in Samaria and Judea at the time of Jesus.
Today all Maronite religious services are still chanted in Aramaic; however, most of the young people of Jish don’t understand what they are saying.
Long before we ever heard of the NSA in our local news, or security issues were a problem, this organisation was working away in the background monitoring our communication! This article of which l have copied and pasted just a small segment of 4 long pages, explains in fine detail, how it brings into being suspect comments by political leaders, that we only ever cared about you, the citizen’s security! In fact it makes a complete farce of some of the recent denials by the NSA themselves! This simple 3 paragraphs says all there is about, how we were being monitored! The fact they can convince a large percentage of the population of America is is for their own good, and people like Edward #Snowden and Julian #Assange are our enemy and that this government are our political friends, my thought is ” With Friends Like That Who Needs To Worry About Our Enemies” as our enemies maybe really be our only friends ,at the end of days!
So read this with due consideration that what maybe true, what could be true and what may not even be true at all!
After the agency’s orders were publicized by several newspapers and magazines, the N.S.A. decided to pull in its horns. Inman, the N.S.A.’s director, told a House committee that the two orders exemplified ”not a faulty law but inadequate Government attention to its application.” He characterized the agency’s handling of the voice-scrambling equipment as a ”well-meaning attempt to hold the line that had clearly already been passed by.”
A few years before, the director of the National Science Foundation, Richard C. Atkinson, and Inman had begun privately discussing whether the role of the spy agency in supervising cryptographic research should be expanded. The precise outcome of the talks remains murky, but the N.S.A. apparently won the debate. Today, the National Science Foundation routinely allows the N.S.A. to review any request for the funding of cryptographic research. The N.S.A. also has begun providing financial support for related unclassified civilian research. The first recipients of such support were two Stanford professors of electrical engineering, John T. Gill 3d, and Martin E. Hellman, a code expert who for many years had been sharply critical of the N.S.A.
”Five years ago, I was very much on the opposite side of the fence from N.S.A.,” said Hellman. ”I wouldn’t say I have been co-opted. As a result of them being more friendly and coming part way, I felt I should be more friendly. I guess I am now the first guinea pig.”
- ‘Cryptopalypse’ Now: Looming Security Crisis Could Cripple Internet (livescience.com)
- NSA Scandal ~ The US: Surveillance, secrets and security (newsbooze.com)
- An Open Letter to My Former NSA Colleagues (slate.com)
- NSA analysts ‘wilfully violated’ surveillance systems, agency admits (theguardian.com)
- A Blockbuster Article on the Dangers of the NSA…From March 27, 1983 (wchildblog.com)
- Blockbuster Article On The Dangers Of The NSA … From March 27, 1983 (infiniteunknown.net)
The Washington Post and The Guardian have revealed a US government mass Internet surveillance program code-named “PRISM”. They report that the NSA and the FBI have tapped directly into the servers of nine US service providers, including Facebook, Microsoft, Google, Apple, Yahoo, YouTube, AOL and Skype, and began this surveillance program at least seven years ago. (clarifying slides)
These revelations are shaking up an international debate.
StartPage has always been very outspoken when it comes to protecting people’s Privacy and civil liberties. So it won’t surprise you that we are a strong opponent of overreaching, unaccountable spy programs like PRISM. In the past, even government surveillance programs that were begun with good intentions have become tools for abuse, such as tracking civil rights and anti-war protesters.
Programs like PRISM undermine our Privacy, disrupt faith in governments, and are a danger to the free Internet.
StartPage and its sister search engine Ixquick have in their 14-year history never provided a single byte of user data to the US government, or any other government or agency. Not under PRISM, nor under any other program in the US, nor under any program anywhere in the world.
Here’s how we are different:
- StartPage does not store any user data. We make this perfectly clear to everyone, including any governmental agencies. We do not record the IP addresses of our users and we don’t use tracking cookies, so there is literally no data about you on our servers to access. Since we don’t even know who our customers are, we can’t share anything with Big Brother. In fact, we’ve never gotten even a single request from a governmental authority to supply user data in the fourteen years we’ve been in business.
- StartPage uses encryption (HTTPS) by default. Encryption prevents snooping. Your searches are encrypted, so others can’t “tap” the Internet connection to snoop what you’re searching for. This combination of not storing data together with using strong encryption for the connections is key in protecting your Privacy.
- Our company is based in The Netherlands, Europe. US jurisdiction does not apply to us, at least not directly. Any request or demand from ANY government (including the US) to deliver user data, will be thoroughly checked by our lawyers, and we will not comply unless the law which actually applies to us would undeniably require it from us. And even in that hypothetical situation, we refer to our first point; we don’t even have any user data to give. We will never cooperate with voluntary spying programs like PRISM.
- StartPage cannot be forced to start spying. Given the strong protection of the Right to Privacy in Europe, European governments cannot just start forcing service providers like us to implement a blanket spying program on their users. And if that ever changed, we would fight this to the end.
Privacy. It’s not just our policy, it’s our mission.
Robert E.G. Beens
CEO StartPage.com and Ixquick.com
- Giant US government Internet spying scandal revealed! (acenewsservices.com)
- Message from search engine “StartPage.com” (12160.info)
- Could this keep NSA from listening in? (wnd.com)
- Your Searches are Safe With Perfect Internet (brafricanorth.wordpress.com)
- Which internet company hasn’t given the U.S. government it’s records? (jacobsfotos.wordpress.com)
- Facebook Users Export Their Online Journal to Physical Books in Light of PRISM Fears (prweb.com)
- Myzilch.com Continues Its PRISM-Less Shopping Experience (prweb.com)
When you read articles like this one you think you must be reading a story from the third world, maybe Bangladesh or similar! But NO this is about homeless men and women living close to Stockport, Greater Manchester, that’s right, here in the UK!
Yesterday l heard about Ipsos awards a 15% pay rise to people on salaries of £66,000 or more, as they cannot live on this amount!
Trying living on the streets of Greater Manchester for a while and see how that feels!
But of course we have a government and a Chancellor who says we are in in this together, well these two small comparisons, show that we are not and it is a lie! Of course well is it not this government that coined the word #austerity, well let them have their cake and eat it, and may it taste foul in their mouths, as the come to terms with what other people suffer!
Oh l know some that will read this post and this excellent article and say we cannot change these people they are oblivious to other peoples pain, but l say this that one man started a revolution and his name was Jesus and as the story goes he will return!
Or maybe just maybe he is watching all this and already preparing for his “Second Coming” when these people will be judged that judged others wanting!
The cost of just hiring a deputy to assist the GM’s Police Chief during these times of #austerity
- Greater Manchester’s elected police chief Tony Lloyd WILL hire a deputy at £55k a year (manchestereveningnews.co.uk)
A federal judge has ruled that Google must comply with the FBI’s warrantless requests for confidential user data, despite the search company’s arguments that the secret demands are illegal.
CNET has learned that U.S. District Judge Susan Illston in San Francisco rejected Google’s request to modify or throw out 19 so-called National Security Letters, a warrantless electronic data-gathering technique used by the FBI that does not need a judge’s approval. Her ruling came after a pair of top FBI officials, including an assistant director, submitted classified affidavits.
The litigation taking place behind closed doors in Illston’s courtroom — a closed-to-the-public hearing was held on May 10 — could set new ground rules curbing the FBI’s warrantless access to information that Internet and other companies hold on behalf of their users. The FBI issued 192,499 of the demands from 2003 to 2006, and 97 percent of NSLs include a mandatory gag order.
I was reading today on my news feed about the same thing happening in modern-day Hong Kong, and how domestics have their wages taken from them, by their so-called employers. This being in the name of being allowed to have a job! Will try to find the link to the post and add it to my comment!
Thanks for a great post and video will download and watch it in full on my desktop.
Ace News Group
Originally posted on I Love History...and Research:
“Slavery by Another Name is a 90-minute documentary that challenges one of Americans’ most cherished assumptions: the belief that slavery in this country ended with the Emancipation Proclamation. The film tells how even as chattel slavery came to an end in the South in 1865, thousands of African Americans were pulled back into forced labor with shocking force and brutality. It was a system in which men, often guilty of no crime at all, were arrested, compelled to work without pay, repeatedly bought and sold, and coerced to do the bidding of masters. Tolerated by both the North and South, forced labor lasted well into the 20th century.
For most Americans this is entirely new history. Slavery by Another Name gives voice to the largely forgotten victims and perpetrators of forced labor and features their descendants living today.”
View original 10 more words