White House “Lost” E-mails – Evade Recordkeeping?

Note to Author: One of your jtags is missing a closing quote or a />. Your post is currently broken Tags: , ,

Bush Evades Congress, Possibly Broke the Law (Again)

George W. Bush
(Image used under: Fair Use doctrine)

Showing his usually disregard for Congress, the American people, and rules, Bush named an ambassador in a way that circumvented Congressional oversight.

The appointment, made while lawmakers were out of town on spring break, prompted angry rebukes from Democrats, who said Bush's action may even be illegal.
Tags: ,

House Committee Bans the “War on Terror” Catchphrase

George W. Bush
(Image used under: Fair Use doctrine)

The "War on Terror" is political spin initiated by President Bush to justify using "wartime" powers indefinitely. Just like the "War on Drugs", the war on terror will never end.

Nobody disagrees to giving a little leeway to our commander in chief during a clear and present need, but that's the point: a war on terror that lasts an indefinite amount of time is neither clear, nor present.

It's about danged time that someone in a high position finally dropped this marketing ploy where it belongs.

Tags: , , ,

President Can Decide Who Is Enemy – Hold Them Without Trial Forever

(Image used under: Creative Commons 2.0 [SRC])

Public Citizen reports:

A new law enacted last fall denies a fair hearing or hardly any hope of release to those confined at Guantanamo naval base, and to other non-citizens labeled "enemy

Public Citizen has a web petition going here.

Tags: , , , ,

Bush Wants Aides to Testify Privately and Not Under Oath

(Image is used under the Pixabay license)

In Short

A defiant President Bush warned Democrats Tuesday to accept his offer to have top aides testify about the firings of federal prosecutors only privately and not under oath or risk a constitutional showdown from which he would not back down

The Response

Democrats' response to his proposal was swift and firm: They said they would start authorizing subpoenas as soon as Wednesday for the White House aides.
Tags: , ,

FBI Illegally Circumvents Subpeonas

(Image is in the Public Domain)

According to the Washington Post, the FBI issued thousands of national security letters many without any clear ties to "emergencies" or current investigations.

Referring to the exigent circumstance letters, Sen. Charles E. Grassley (R-Iowa) wrote in a letter Friday to Justice Department Inspector General Glenn A. Fine: "It is . . . difficult to imagine why there should not have been swift and severe consequences for anyone who knowingly signed . . . a letter containing false statements. Anyone at the FBI who knew about that kind of wrongdoing had an obligation to put a stop to it and report it immediately."

No kidding. What I don't get is why everyone is saying that the "FBI's use of the exigency letters "circumvented" the law" rather than just say "They broke the law and many of the buggers are going to jail".

Tags: , ,

Dept of Homeland Security Clueless – Says Privacy Isn’t at Risk

DHL
(Image is in the Public Domain)

Apparently the head of the DHS doesn't see why the REAL-ID act is such a big deal.

I'll make this very simple: Passports. E-voting. Airline security. Domestic spying. Not a great track record.

Tags: , , ,

Idaho Tells REAL ID Act to Shove Off

(Image used under: Creative Commons 2.0 [SRC])

Idaho has joined a growing trend of states that are flat out telling the federal government to jump off a cliff. The REAL ID act has been attacked by privacy organizations for being a national ID card which will have far reaching implications to personal freedom. Not only that, but implementation of the system is extremely expensive and each state is supposed to pay for it.

Tags: , , , ,

FBI Abuses Power – Accountability No Where In Sight

(Image is in the Public Domain)

Bruce Shneier says it better, with more sources, but the FBI is abusing it's powers to circumvent the subpeona process.

The Justice Department's inspector general has prepared a scathing report criticizing how the F.B.I. uses a form of administrative subpoena to obtain thousands of telephone, business and financial records without prior judicial approval.
Tags: , ,

Presidential Privacy Board Clears The President of Wrong-Doing

George W. Bush
(Image used under: Fair Use doctrine)

In a move that's sure to shock every child under the age of 6, Bush's privacy board cleared him of any privacy invasion.

Civil liberties groups who've advocated that the board be separated from the executive branch and given real subpoena power are unlikely to be satisfied with the board's findings. Congressional Democrats have already expressed disdain for the new report, and they're moving to strengthen the board's oversight capabilities.
Tags: , ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

goodbye identity theft Tutorial
|INDEX|next: Credit Freeze

Too Late!

If you've already become a victim, here is a list of things you should do.

Solving ID Theft

Lock your credit reports with a Credit Freeze to prevent credit-based ID theft (90% of ID theft risk).
Learn to protect your information to prevent not only ID theft, but many other kinds of problems (the rest of ID theft risk).

Save Time and Money

cancel credit-monitoring services.
Cancel id-theft-insurance

Who is Responsible?

Sometimes you just have to wonder why it's so easy to steal identities in the first place.

... or check out any of my other guides and tutorials by clicking here!

The Identity Theft Victim's Mini-Guide to Recovery

If you've already experienced ID theft, here are some tips of what to do next.

[Click for full description]

Credit Freeze

Setting a credit report freeze is the fastest and most effective way to actually block and reduce your risk of ID Theft. And it's free.

[Click for full description]

Out and About Defense

The best defense against non-credit ID Theft and a variety of other risks is to adopt a mindset of protection: Data Defense. Learn how to protect your information with simple and sometimes free countermeasures all based on a simple philosophy that the less people who have your information, the safer you are.

[Click for full description]