Showing posts with label history. Show all posts
Showing posts with label history. Show all posts

Sunday, May 03, 2009

What Makes Justice Scalia A Really Bad Judge

What Makes Justice Scalia A Really Bad Judge “This year, after U.S. Supreme Court Justice Antonin Scalia made public comments that seemingly may have questioned the need for more protection of private information, Reidenberg assigned the same project. Except this time Scalia was the subject, the prof explains to the ABA Journal in a telephone interview.

His class turned in a 15-page dossier that included not only Scalia's home address, home phone number and home value, but his food and movie preferences, his wife's personal e-mail address and photos of his grandchildren, reports Above the Law.

And, as Scalia himself made clear in a statement to Above the Law, he isn't happy about the invasion of his privacy:”

But, like other bad jurists, Scalia is unwilling to admit to a constitutional right of privacy because it doesn't mention the word. The philosophy of strict constructionism blinds him to the implication forcefully set out in the fourth and fifth amendments that make no rational sense without the concept of privacy. Also, the same philosophy requires him to ignore the fact that the constitution set forth rules regulating slavery, and how slaves were to be counted for purpose of congressional representation, without ever using the words slave or slavery.

Slaves and slavery existed. The constitution regulated them by implication. Yet Justice Scalia can't admitthat implication makes privacy a constitutional right. The philosophy that sees the law as something divorced from human practice and behavior probably explains some pof the bizarre opinions he's written as much as his briliant ones. Unfortunately, brilliant philosophy cab give you phlogiston instead of thermodynamics, epicycles instead of orbits, wonderful explication of things that never were, and a rage to with brilliant wit disprove and therefor silence simple self-evident truths.

The brilliantly wrong are the worst people possible to place in positionss of authority. The brilliant, bold but badly mistaken Justice Scalia is in position for life.

http://www.schneier.com/blog/archives/2009/05/googling_justic.html

Sunday, March 29, 2009

Restoring the Palimpsest until March 26, 2009

We share some bad habits of medieval monks. We decide a record isn't sll thst importsnt, scrub the parchment clean, then write our current, comforting interpretation on the page we insist is not just blank now, but has always been a tabula rasa.
Luckily, there are means of examination that reveal the original record and scholars like Dr. John Hope Franklin who patiently uncover the real past and set us on the path to our true destiny.
Dr. Franklin taught us to look and the looking expanded the scope of history to people who were written out and abandoned to the margins even when they were major players. He enabled us to see how far we've actually come and how far we yet must go.
He will be missed, because he cannot be replaced.

Alfred C. Ingram
Conceptual Design & Imaging
773 530-1554

Tuesday, January 20, 2009

Inauguration of Barack Hussein Obama

Monday, January 12, 2009

People don’t eat in the long run. They eat every day

Editorial Observer - Republicans’ Latest Talking Point - The New Deal Failed - NYTimes.com:

"Congressional Republicans say Mr. Obama’s stimulus will cost too much, and that over time the economy will cure itself. When critics raised the same objections to F.D.R.’s programs, his relief administrator, Harry Hopkins, had a ready answer: “People don’t eat in the long run. They eat every day.”"

http://www.nytimes.com/2009/01/12/opinion/12mon4.html?ref=opinion

Friday, October 24, 2008

'Block the Vote' Tactics Go Online This Election - Desktop Security News Analysis - Dark Reading - Sent Using Google Toolbar

'Block the Vote' Tactics Go Online This Election - Desktop Security News Analysis - Dark Reading

OCTOBER 22, 2008 Voter suppression and deception tactics could go online in the final days or hours of this hotly contested Presidential election season -- including spoofing voting and campaign Websites, fake voice-call blasts via VOIP, phishing, and denial-of-service attacks on legitimate polling Websites -- according to a new report released this week.

There already have been online attempts to disrupt the election activity of specific blocks of voters, according to the Electronic Privacy Information Center's (EPIC) E-Deceptive Campaign Practices Report. Phony emails were sent to Florida voters stating that they would be unable to vote if their ID didn't match a state database; robo-calls went to women voters in North Carolina with false information about their voter registration status; and fake emails were sent to voters in Maryland saying they would be barred from voting if their home was under foreclosure.

Voter suppression campaigns traditionally have used misleading telephone calls, direct mail, and mass literature drops designed to confuse or inhibit voters from casting their ballots. Typical tricks include spreading phony information or rumors about polling times, the election date, voter-identification rules, or voter eligibility. But with voters using the Internet more for researching and supporting their voting decisions and logistics, the threat of online deception campaigns against voters has become very real this year -- using email, instant messaging, VOIP, and cell phones in an attempt to rapidly and widely spread misinformation to voters and to disrupt the election process, according to the EPIC report.

Worries over voter suppression have intensified as voter registration numbers have hit near-record marks for this election. And online deceptive tactics will be tougher to identify and stop than traditional ground-game methods. "Prevention of electronic deceptive practices will be as difficult, or more so, than attempts to prevent those launched by deceptive land-line telephone calls, direct mail, or knock and drop campaign efforts," the report says. "The challenge of stopping electronic deceptive campaign practices are difficult because the source of the attack can be from any location around the globe, the launch of an attack can be timed to begin within hours of an election; and tracing the source of the attack can be time consuming and not yield actionable results."

Unscrupulous people can easily "profile" voters using widely available information on the Internet and use that in their targeted attacks, the report says. "In the context of deceptive election practices 'spoofing,' 'phishing,' 'pharming,' 'denial of service,' and 'social engineering' are tactics that can be used to deceive voters. In addition, 'rumor mongering' can also impact voter participation," the report says. Bruce Schneier, a co-contributor to the report, says he doesn't expect election officials to do much about these threats because they are still relatively new on the election scene, and there's not much they can do about them in some cases, anyway.

"Basically, the moral is that dropping the cost of communication down to free means that both good and bad communication is much cheaper. We know this is true for commercial email: spam. This is also true for deceptive voting suppression practices," says Schneier, who is chief security technology officer at BT.

Here's a look at the types of unsavory tactics that could be deployed online: A state election board's Website could be spoofed, for instance, with purposely deceptive information on polling-place locations, times, and voter registration rules.

Phishing emails could be pushed out to voters, offering phony information on polling sites, voter records, voter registration, and voter registration status in an effort to confuse or scare away voters, for instance.

Pharming emails could use hijacked domain names such as "Get Out the Vote," according to the report, as a way to redirect voters to fraudulent sites.

DOS attacks could be launched on voter information sites or voter help hotlines in order to disrupt the process.

"Rumor-mongering" efforts could be launched that seed fake stories through blogs about election delays or cancellations "due to an emergency." Poll workers could be targeted by social engineering tactics that result in delays in poll-location openings or other disruptions

A "Google bomb" could be set to boost a Web page ranking with phony links.

The EPIC report also provides recommendations for election officials and voters in how to look out for these scams and prevent themselves from falling victim to them. The report was issued in conjunction with a legal and policy report on these online voter suppression threats that EPIC co-authored with Common Cause and the Lawyers Committee for Civil Rights Under Law.

http://www.darkreading.com/document.asp?doc_id=166495&f_src=drweekly

Monday, September 15, 2008

Constitution Day Resources - THOMAS (Library of Congress)

Constitution Day Resources - THOMAS (Library of Congress):
"On September 17, 1787, the final draft of the Constitution was signed by 39 delegates. The document was then sent to the states for ratification, and went into effect on June 21, 1788 when New Hampshire became the ninth state to ratify the Constitution.
In celebration of Constitution Day, the Library of Congress has compiled a variety of materials from across its collections. Explore these rich resources and features to learn more about one of America’s most important documents.
Primary Source Documents Related to the United States Constitution

http://thomas.loc.gov/teachers/constitution.html