frankilin roosevelt

It's not about being liberal or conservative anymore y'all. That is a hype offered by the fascist whores who want to confuse the people with lies while they turn this country into an aristocratic police state. Some people will say anything to attain power and money. There is no such thing as the Liberal Media, but the Corporate media is very real.

Check out my old  Voice of the People page.

Gino Napoli
San Francisco, California
High School Math Teacher

Loyalty without truth
is a trail to tyranny.

a middle-aged
George Washington

1601 POSTS

August 2023
July 2023
June 2023
April 2023
March 2023
February 2023
January 2023
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
May 2022
April 2022
February 2022
January 2022
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
April 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
August 2018
July 2018
June 2018
May 2018
April 2018
December 2017
November 2017
October 2017
September 2017
June 2017
May 2017
April 2017
March 2017
February 2017
January 2017
December 2016
November 2016
September 2016
August 2016
May 2015
March 2015
February 2015
January 2015
December 2014
September 2014
August 2014
May 2014
March 2014
December 2013
November 2013
October 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
August 2012
July 2012
April 2012
March 2012
January 2012
December 2011
November 2011
October 2011
August 2011
July 2011
June 2011
January 2011
December 2010
November 2010
October 2010
August 2010
July 2010
March 2010
January 2010
December 2009
November 2009
August 2009
July 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
August 2008
July 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
August 2007
July 2007
June 2007
May 2007
April 2007
February 2007
January 2007
December 2006
November 2006
October 2006
September 2006
August 2006
June 2006
April 2006
March 2006
February 2006
January 2006
December 2005
November 2005
October 2005
September 2005
August 2005
June 2005
May 2005
March 2005
February 2005
January 2005
December 2004
November 2004
October 2004
September 2004
August 2004

Wednesday, 12 June 2013 at 18h 39m 46s

More reasons to be skeptical

The use of data mining wasn't how they foiled prior terrorist plots. The data mining wasn't even necessary.

Lawyers and intelligence experts with direct knowledge of two intercepted terrorist plots that the Obama administration says confirm the value of the NSA's vast data-mining activities have questioned whether the surveillance sweeps played a significant role, if any, in foiling the attacks.


... court documents lodged in the US and UK, as well as interviews with involved parties, suggest that data-mining through Prism and other NSA programmes played a relatively minor role in the interception of the two plots. Conventional surveillance techniques, in both cases including old-fashioned tip-offs from intelligence services in Britain, appear to have initiated the investigations.

In the case of Zazi, an Afghan American who planned to attack the New York subway, the breakthrough appears to have come from Operation Pathway, a British investigation into a suspected terrorism cell in the north-west of England in 2009. That investigation discovered that one of the members of the cell had been in contact with an al-Qaida associate in Pakistan via the email address

British newspaper reports at the time of Zazi's arrest said that UK intelligence passed on the email address to the US. The same email address, as Buzzfeed has pointed out, was cited in Zazi's 2011 trial as a crucial piece of evidence. Zazi, the court heard, wrote to asking in coded language for the precise quantities to use to make up a bomb.

Eric Jurgenson, an FBI agent involved in investigating Zazi once the link to the Pakistani email address was made, told the court: "My office was in receipt I was notified, I should say. My office was in receipt of several email messages, email communications. Those email communications, several of them resolved to an individual living in Colorado."

Michael Dowling, a Denver-based attorney who acted as Zazi's defence counsel, said the full picture remained unclear as Zazi pleaded guilty before all details of the investigation were made public. But the lawyer said he was sceptical that mass data sweeps could explain what led law enforcement to Zazi.

"The government says that it does not monitor content of these communications in its data collection. So I find it hard to believe that this would have uncovered Zazi's contacts with a known terrorist in Pakistan," Dowling said.

Further scepticism has been expressed by David Davis, a former British foreign office minister who described the citing of the Zazi case as an example of the merits of data-mining as "misleading" and "an illusion". Davis pointed out that Operation Pathway was prematurely aborted in April 2009 after Bob Quick, then the UK's most senior counter-terrorism police officer, was pictured walking into Downing Street with top secret documents containing details of the operation in full view of cameras.

The collapse of the operation, and arrests of suspects that hurriedly followed, came five months before Zazi was arrested in September 2009. "That was the operation that led to the initial data links to Zazi they put the clues in the database which gave them the connections," Davis said.

Davis said that the discovery of the email and in turn the link to Zazi had been made by traditional investigative work in the UK. He said the clue-driven nature of the inquiry was significant, as it was propelled by detectives operating on the basis of court-issued warrants.

"You can't make this grand sweeping [data collection] stuff subject to warrants. What judge would give you a warrant if you say you want to comb through vast quantities of data?"


[Some defenders] have also pointed to the case of David Headley, who in January was sentenced to 35 years in jail for having made multiple scouting missions to Mumbai ahead of the 2008 terrorist attacks that killed 168 people. Yet the evidence in his case also points towards a British tip-off as the inspiration behind the US interception of him.

In July 2009, British intelligence began tracking Headley, a Pakistani American from Chicago, who was then plotting to attack Danish newspaper Jyllands-Posten in retaliation for its publication of cartoons of the prophet Mohammed. Information was passed to the FBI and he was thereafter, until his arrest that October, kept under targeted US surveillance.

An intelligence expert and former CIA operative, who asked to remain anonymous because he had been directly involved in the Headley case, was derisive about the claim that data-mining sweeps by the NSA were key to the investigation. "That's nonsense. It played no role at all in the Headley case. That's not the way it happened at all," he said.

[SOURCE: Ed Pilkington and Nicholas Watt ||12 June 2013]

And it didn't help with the Boston bombers despite their 6 month trip to Chechnya and despite the warning given to the United States by the Russians. The FBI were supposedly following them.

Ah ha. It's because they didn't get a hit on the search term "terrorists who want to bomb" and decided their work was done.

Nothing to see here. Move along to the next officially manufactured crisis please.

Tuesday, 11 June 2013 at 18h 40m 45s

Of Course they won't target disident groups

They already have.

Could the sprawling surveillance state enable government or its legion of private contractors to abuse their technology and spy upon domestic political targets or judges?

This is not a far off possibility. Two years ago, a batch of stolen e-mails revealed a plot by a set of three defense contractors (Palantir Technologies, Berico Technologies, and HBGary Federal) to target activists, reporters, labor unions, and political organizations. The plans -- one concocted in concert with lawyers for the U.S. Chamber of Commerce to sabotage left-leaning critics, like the Center for American Progress and the SEIU, and a separate proposal to "combat" WikiLeaks and its supporters, including Glenn Greenwald, on behalf of Bank of America -- fell apart after reports of their existence were published online. But the episode serves as a reminder that the expanding spy industry could use its government-backed cyber tools to harm ordinary Americans and political dissident groups.

The episode also shows that Greenwald, who helped Snowden expose massive spying efforts in the U.S., had been targetted by spy agency contractors in the past for supporting whistleblowers and WikiLeaks.

[SOURCE:Lee Fang|The Nation|12 June 2013]

Tuesday, 11 June 2013 at 18h 56m 21s

Subcontractors and Private firms can't eliminate rogue actors

I just called Dianne Feinstein. You should to. (202) 224-3841

I also just sent her an email.

Private contractors can't control what their people do. Lots of recent lessons in Iraq, as you should know. For instance: subconstractors Selling secrets to help private firms that then give contractors a cushy job when you leave.

One subcontracting agent in Seattle hacked into a cell phone of a girl he liked and was stalking.

Others found listening in on soldiers calls to spouses and extra-marital affairs because it was fun.

We have no oversight over this vast amount of private data that can easily get into the wrong hands because it's outsourced to so many private firms who are more about billing the government for profits than they are about anything else.

And we can't prevent abuses when the apparatus is hidden underneath complicated webs of private firms that bill the government. Why can't the government do this itself? Are we so wedded to enriching private firms even when it will cause an unmanageable security risk?

The New York Times and Washington Post have both done plenty of stores about the shadow security state being built out and performed by private contractors. With little oversight. What's to keep someone with security clearance from selling secrets to corporate or foreign groups for personal profit?

Answer: nothing.

Snowden didn't reveal anything that wasn't known about. No secret agents were compromised. The threat of privatization and the bureaucracy of an unaccountable data mining operation is real.

So if the only take you have on this is that Snowden is treasonist and nothing else, shame on you, because it shows how craven you are to the status quo, to the point where you belittle the messenger who tells you the house is on fire and ignore the evidence that it was arson because you wanna believe in magical thinking and ignore history.

Shame. On. You.

It's my understanding that I'll get a letter of response. I'll share it with you if this happens.

Sunday, 9 June 2013 at 0h 36m 42s

My new Love

This song really has my heart strings right now.

Saturday, 8 June 2013 at 12h 41m 34s

A new Map of the US

Using a site that tracks dollar bills, a theoretical physicist noticed that our state boundaries are rather arbitrary, but that money tends to stay within new, more realistic boundaries.

This is cool

Saturday, 8 June 2013 at 12h 21m 58s

What is Water

This 9 minute video blew my freaking mind.

Thursday, 6 June 2013 at 19h 17m 44s

The Fourth Amendment

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

Are we "secure in our persons,..., papers, and effects" when every single telephone communication or text or email you ever make goes into a government database ?

And "probable cause" must be "supported by Oath or affirmation AND" any search warrants issued must in particular describe specifically "the place to be searched, and the persons or things to be seized."

Collecting data from the citizens under the belief that this keeps us safe from "terrorists" presumes that there is a way to mine the data that will always be independent of potential political partisan witch hunts that can be (and has been in the past) used to blacklist or blackmail individuals who are otherwise obeying the law. Authorities can use this information to have prior knowledge about various groups or networks of individuals who are law abiding citizens by simply analyzing who calls who and how often.

Which is really why this is happening. Tracking real criminals and real terrorists is more difficult, because real criminals and real terrorists have been communicating with satellite telephones and/or laptop computers for a decade.

Every single recent security breech event since the 1990's has been about incompetence ... and some would say willful ignorance. Is this the security state gone rogue?

Thursday, 6 June 2013 at 18h 58m 1s

That crazy new Plant out to destroy the world

It was just growing mysteriously in the backyard.

Thursday, 6 June 2013 at 18h 26m 30s

The Stress Test Optical Illusion

Thursday, 6 June 2013 at 15h 6m 36s

Two questions

Today I was thinking about how whenever someone asks someone else a question, there was actually a first question in their mind that was thought first; and the second question is what gets verbalized. Sometimes these are the same two questions, sometimes they are different questions.

For instance, if someone asks you "Where did you get that jacket?" one day, the first question might be "That looks just like a jacket I used to own, I wonder were that person got his/her jacket?"

Or it could be, "I wonder if that is a leather jacket?"

Or it could be, "That guy looks cute, I wonder if he's interested in me?"

The first question is subconscious, instinctive to the person's unique thought process. Assuming that the two questions are the same is a bad idea, because it depends upon the situation, and the relationship of the two persons or people involved. People's curiosity about strangers are different, and people with strong relationships can tend to anticipate each others' thoughts.

The first question might be also something that can be inferred from the number of inferential questions that are asked in a succession of events. For instance, a woman or man might have "Can I trust you?" in the back of their head while they are on a date with a new someone in their life.

Anyway, that's what I was pondering this morning.