http://www.truthout.org/docs_2006/032608D.shtml

Another “Sir! No Sir!” moment…

http://www.usdoj.gov/ag/speeches/2008/ag_speech_080328.html

Everybody else is bleating about this speech because it contains this:

“Criminal syndicates, and in some cases even terrorist groups, view IP crime as a lucrative business

Big deal. It’s probably true. So what?

No, my beef is with the imbecile who drafted:

A Russian mobster selling fake handbags through a middleman in New York may also be selling pirated DVDs in London, counterfeit AIDS medicine in Africa, and child pornography over the internet.

who clearly hasn’t got the faintest idea about what MATTERS. Equating property rights with the life and death issue of AIDS or the permanent psychological scarring left by child rape is a psychotic contortion.

The whole thing is classic feeble minded Police State propaganda as well. Anything we disapprove may give aid and comfort to the enemy…

That’s the logic you need to justify treating filesharers, cannabis smokers or dissidents as evil criminals who can be locked up or occasionally murdered as though to prevent social harm. That deliberate intimidation of and brutality against your own citizens in order to force compliance is itself bog standard terrorism.

But State terrorism is vastly worse than private sector terrorism. They have vastly greater resources, are every bit as ruthless and at least when the private terrorist attacks you, we can call upon the services of the State to protect us and to retaliate, if appropriate, on our behalf. To whom do we turn for protection and retaliation when the hostile attacker is our own State?

Anti-War Protest in Hollywood, CA – March 15, 2008

http://ringospictures.com/index.php?page=20080315

FreeThoughtPedia.com & View topic – There was a knock at my door today… guess who?

http://forum.freethoughtpedia.com/viewtopic.php?f=9&t=18

the comment most worth reading is the third one by Grismar…

Russian intelligence sees U.S. military buildup on Iran border

http://www.informationclearinghouse.info/article19640.htm

well this was 4 days ago, what are they waiting for?

http://www.wayoflife.org/fbns/trent.htm

ah, nothing like a good conspiracy theory to warm the cockles…
and this one’s a doozy…

Best Buy Calls Cops On You For Telling Fellow Customer Jawbone Headset Is Overpriced, Sucks – The Consumerist

http://consumerist.com/372959/best-buy-calls-cops-on-you-for-telling-fellow-customer-jawbone-headset-is-overpriced-sucks

obvious breach of his 1st amendment rights, amongst others; as well as a ‘king stupid PR stunt on the part of best buy. Note that it is also what we might call petty “police state” ism in that it reveals the kind of psychological mind set a compliant population can drift into when resort to Authority is presented as the answer to everything…

Ohio man cuffed for shagging picnic table • The Register

http://www.theregister.co.uk/2008/03/31/picnic_table_incident/

the critical question here is whether it was a public or private performance. I can concede the complaint if it was public, but if it was private, what business is it of any third party? Or are we supposed to assume that anything which can be captured on video by nosy neighbours is automatically public from now on?

Assyrian clay tablet points to Sodom and Gomorrah asteroid • The Register

http://www.theregister.co.uk/2008/03/31/kofels_asteroid/

fascinating. almost prehistoric eyewitness record of an asteroid collision…

Get your German interior ministers fingerprint here • The Register

http://www.theregister.co.uk/2008/03/30/german_interior_minister_fingerprint_appropriated/

This illustrates both the weakness of fingerprints as a method of access control and the naivete of politicians who think biometrics are the sole solution to access control. It’s all very well finding a unique biometric but if it is relatively easy to steal and duplicate – as this example demonstrates, then it has NO value in any security situation that MATTERS.

Knowing, for example, what you now know about how easy it is to steal and use your fingerprint, would you be happy to grant access to your house or car based on fingerprint alone? Of course not. So why should we imagine that fingerprints are a remotely sensible way to protect access to aircraft or sensitive databases? (abuse of which could do far more damage to society than having your own house broken into or car stolen)

This is not to say that biometrics are not useful. But the only biometrics, so far, which cannot be trivially stolen and copied are your dna fingerprint (which still takes too long to be used for access control) and your retina print – which can be performed in a couple of seconds. And even then, we can only trust it if the test is performed in our presence with kit we control.

Conclusion, the only safe and practical biometric is the retina print and it is only guaranteed secure when used on trusted kit on trusted premises and supervised by trusted guards. Anything less is “Security Theatre”

There is an interesting suggestion on the comments page, however, where “Jerry” suggests that one way we can defeat the State bully and their abuse of exclusive access to such data is to publish our own biometrics ourselves.

This is almost attractive. We could then legitimately claim, for example, that if our spoor is ever detected at the scene of a crime, it could have been planted there by a hostile party wishing to frame us. This could, at least, provide Juries with enough doubt to make the prosecutors’ task much more difficult.

But we cannot glibly ignore the downside of that breach of our own privacy. It would, for example, make us much easier prey for stalkers, private detectives, government agents and other hostile attackers who may not wish to frame us but do wish to spy on us.

WEDDING BANDS | BANDS FOR HIRE | BANDS TO HIRE

http://www.hulagroove.co.uk/wedding_bands_2.asp

bootiful

Reggie Watts

http://www.reggiewatts.com/

Huge talent, bit light on material, but give him time…

http://www.washingtonpost.com/wp-dyn/content/article/2008/03/29/AR2008032900676.html

tnx to Xtine66 for this one. This is an example of where Trusted Surveillance would improve

privacy: no video footage available to arbitrary police or others with access to the video control points or network;

accountability: whoever was involved in the transaction would be identifiable through key escrow, provided a jury agreed that identity retrieval was justified and

security: knowing that id fraud was not sustainable, much less of it will be attempted.

In other words, under TS, this kind of cockup could not happen. First, nobody would know anything at all about this – or any other – transaction unless one of the parties has cause to complain and choose to release their own copy of the evidence (in private and even anonymously if they prefer) to show that an offence has been committed.

Once such a complaint has been made, and assuming that TS is active at the relevant time and place, it is impossible either for a guilty party to prove their innocence, or for an over enthusiastic police force to prove the guilt of an innocent party. At the same time, TS can make it trivial to prove ones own innocence, and, in most cases, to do that anonymously.

http://blog.wired.com/defense/2008/03/from-0004-to-20.html

this aint just a movie, of course. It’s yet another example of the benefits and relative ease of implementing Trusted Surveillance. There wouldn’t be any My Lai massacres or Abu Ghraibs if all the troops were automatically and painlessly recorded every step of the way.

Cops bust teens root-beer kegger – U.S. news – Weird news – msnbc.com

http://www.msnbc.msn.com/id/23851011?GT1=43001

wot? No tazing?