Archive for August 2010
“we have a Secret Government of 854,000 people, so vast and so secret that nobody knows what it does or what it is. That there is a virtually complete government/corporate merger when it comes to the National Security and Surveillance State is indisputable”
It is unsurprising that the 9/11 attack fostered a massive expansion of America’s already sprawling Surveillance State. But what is surprising, or at least far less understandable, is that this growth shows no signs of abating even as we approach almost a full decade of emotional and temporal distance from that event. The spate of knee-jerk legislative expansions in the immediate aftermath of the 9/11 trauma — the USA-PATRIOT Act — has actually been exceeded by the expansions of the last several years — first secretly and lawlessly by the Bush administration, and then legislatively and out in the open once Democrats took over control of the Congress in 2006. Simply put, there is no surveillance power too intrusive or unaccountable for our political class provided the word “terrorism” is invoked to “justify” those powers.
The More-Surveillance-Is-Always-Better Mindset
Illustrating this More-Surveillance-is-Always-Better mindset is what happened after The New York Times revealed in December, 2005 that the Bush administration had ordered the National Security Agency to eavesdrop on American citizens without the warrants required by law and without any external oversight at all. Despite the fact that the 30-year-old FISA law made every such act of warrantless eavesdropping a felony, “punishable by a fine of not more than $10,000 or imprisonment for not more than five years, or both,” and despite the fact that all three federal judges who ruled on the program’s legality concluded that it was illegal, there was no accountability of any kind. The opposite is true: the telecom corporations which enabled and participated in this lawbreaking were immunized by a 2008 law supported by Barack Obama and enacted by the Democratic Congress. And that same Congress twice legalized the bulk of the warrantless eavesdropping powers which The New York Times had exposed: first with the 2007 Protect America Act, and then with the 2008 FISA Amendments Act, which, for good measure, even added new warrantless surveillance authorities.
August 11, 2010 thescientist.com
Posted by Bob Grant
Plant scientists around the world are warning that hundreds of years of accumulated agricultural heritage are in danger of being plowed under after a Russian court ruled today (August 11) that the land occupied by a world-renowned plant bank on the outskirts of Saint Petersburg may be transferred to the Russian Housing Development Foundation, which plans to build houses on the site.
The fate of the collection at the Pavlovsk Experimental Station, which includes more than 70 hectares planted with 5,500 different varieties of apples, pears, cherries, and numerous berry species — most of which occur nowhere else on Earth and were developed over hundreds of years by farmers in northern Europe, Scandinavia and Russia — was decided in Russia’s Supreme Arbitration Court at 10:30 AM, Moscow time.
“It’s a bad day for biodiversity,” said Cary Fowler, director of the Global Crop Diversity Trust, which has for months been trying to raise awareness of the dire situation at the decades-old collection. The collection of plants was started in 1926 by the father of seed banking, revered Russian geneticist Nikolai Vavilov. “Unless somebody intervenes, we’re going to stand there at the gates and watch the bulldozers destroy thousands of varieties that are growing in a collection that dates back to 1926,” Fowler told The Scientist.
August 6, 2010 Care2
This is the stuff of my nightmares: Genetically-modified (GM) plants escaping the confines of agriculture and invading the wild. We thought regular invasive species were bad? They seem tame compared to genetic contamination of the wild. Even more alarming: Some of the plants had a mix of modified genes, indicating that they are reproducing on their own.
Although GM plant populations in the wild have been found in Canada, this is the first time they have been found in the United Sates.
Meredith G. Schafer, from the University of Arkansas, and colleagues established transects of land over 3000 miles long including interstate, state and county roads in North Dakota from which they collected, photographed and tested 406 canola plants.
The results show that transgenic plants have clearly established populations in the wild. Of the 406 plants collected, 347 tested positive for CP4 EPSPS protein (resistant to glyphosate herbicide, aka Roundup) or PAT protein (resistant to glufosinate herbicide, aka LibertyLink). The finding shows that genetically modified canola plants can survive and thrive in the wild perhaps for decades–the study was presented today at the annual meeting of the Ecological Society of America.
The team’s key finding was two plants that each carried both types of herbicide resistance — a combination that is not commercially available. The only way this can happen in the wild is if the plants are reproducing on their own. “There were two instances of multiple transgenes in single individuals,” said coauthor Cynthia Sagers, University of Arkansas. “Varieties with multiple transgenic traits have not yet been released commercially, so this finding suggests that feral populations are reproducing and have become established outside of cultivation. These observations have important implications for the ecology and management of native and weedy species, as well as for the management of biotech products in the U.S.”
Once a GM crop is released it cannot be unreleased, and there are no systems in place to prevent genetic contamination through pollen flow, spills or human error. Although the GM plants found by the roadside are assumed to be the result of escaped seeds during transportation, the GM plants found away from roads suggest that the plants are taking on a life of their own.
from July, 2010
Thoughtful and rational discussion of this issue is in short supply. Steven Aftergood is the writer of Secrecy News, a publication of the Federation of American Scientists, which reports on new developments in government secrecy and provides public access to documentary resources on secrecy, intelligence and national security policy.
July 30, 2010 Transcript Onthemedia audio available at site
WikiLeaks leaked the biggest collection of classified documents in U.S. history, a fact that should make government-transparency advocates proud. But even some of WikiLeaks most likely allies have mixed feelings about precisely how this leak took place and how WikiLeaks operates. Longtime open government writer Steven Aftergood makes his case.
BROOKE GLADSTONE: WikiLeaks has demonstrated its ability to flout U.S. law by being, in effect, stateless. Guided by different priorities than the more traditional advocates of sunlight, it lives by the rules of the Internet. Here’s Julian Assange, WikiLeaks’ founder, explaining his code of conduct.
JULIAN ASSANGE: We’re an activist organization. The method is transparency. The goal is justice.
BROOKE GLADSTONE: Steven Aftergood is the longtime writer of the email newsletter and blog, Secrecy News. For years he’s reported and researched government secrecy and advocated for U.S. government transparency. He’s no stranger to the antagonism between secrecy and disclosure. But in recent months he’s been a critic of WikiLeaks and its methods. Steven, welcome back to the show.
STEVEN AFTERGOOD: Thank you.
BROOKE GLADSTONE: So in June you wrote a blog post offering some praise for WikiLeaks, but you didn’t mince words when it came to its failings. You wrote, quote: “It is not whistleblowing and it is not journalism. It is a kind of information vandalism.”
STEVEN AFTERGOOD: What I was responding to there was a pattern of activity by WikiLeaks in which they were disclosing confidential records of social and religious groups, like the Masons and the Mormons and several others, that did not reveal any misconduct. And it seemed to me that they were using the posture of transparency as a kind of weapon against disfavored groups. And, to me, that was a really repugnant thing to do.
BROOKE GLADSTONE: What about the video of the Apache helicopter attack in Iraq in 2007 that WikiLeaks leaked in April?
STEVEN AFTERGOOD: Well, that I thought was a perfectly legitimate disclosure. I wish the Pentagon had released it when they had been asked to do so. Read the rest of this entry »
by Jack Kenny Thursday, 29 July 2010
When our nation is waging “war on” so many things (drugs, crime, poverty, terrorism), it’s hard to know where to enlist and when to defect. Or put another way, when should a patriot oppose his government? One answer, which we may hope is obvious, is when his government is waging war on liberty. The trick, of course, is to recognize it as such, since the government will always claim to be defending liberty when waging war against it.
Thus it is that in the “war on terrorism” our government is building, brick by brick, a new police state, called “Security.” Consider, for example, this item from The Washington Post:
The Obama administration is seeking to make it easier for the FBI to compel companies to turn over records of an individual’s Internet activity without a court order if agents deem the information relevant to a terrorism or intelligence investigation.
The administration wants to add just four words — ‘electronic communication transactional records’ — to a list of items that the law says the FBI may demand without a judge’s approval. Government lawyers say this category of information includes the addresses to which an Internet user sends e-mail; the times and dates e-mail was sent and received; and possibly a user’s browser history. It does not include, the lawyers hasten to point out, the ‘content’ of e-mail or other Internet communication.
But what officials portray as a technical clarification designed to remedy a legal ambiguity strikes industry lawyers and privacy advocates as an expansion of the power the government wields through so-called national security letters. These missives, which can be issued by an FBI field office on its own authority, require the recipient to provide the requested information and to keep the request secret. They are the mechanism the government would use to obtain the electronic records.
There now. Don’t you feel safer and more secure already? Or do you have that creepy feeling that somebody is looking over your shoulder? Read the rest of this entry »