Click pic for video
From The Truth About Guns … Warrantless searches , no right to remain silent , no Constitutional protections … Welcome to Statism …
Click pic for video
From The Truth About Guns … Warrantless searches , no right to remain silent , no Constitutional protections … Welcome to Statism …
” The internal records of as many as 25,000 Homeland Security Department employees were exposed during a recent computer break-in at a federal contractor that handles security clearances, an agency official said Friday.
The official, who spoke on condition of anonymity to discuss details of an incident that is under active federal criminal investigation, said the number of victims could be greater. The department was informing employees whose files were exposed in the hacking against contractor USIS and warning them to monitor their financial accounts.
Earlier this month, USIS acknowledged the break-in, saying its internal cybersecurity team had detected what appeared to be an intrusion with “all the markings of a state-sponsored attack.” Neither USIS nor government officials have speculated on the identity of the foreign government. A USIS spokeswoman reached Friday declined to comment on the DHS notifications. “
” We’re in the best of hands ” … read more
” Activists on the left are demanding President Obama flex his muscle over the country’s spy agencies.
The CIA’s admission that a handful of officials spied on Senate staffers is proof that the White House has lost control of the intelligence agencies, critics say. They are also discomforted by the continued support Obama has offered for agency Director John Brennan.
“ This is not an isolated incident,” said Becky Bond, political director with the progressive group Credo.
“ The fact that these intelligence officials are able to keep their job when major breaches or major assaults on the Constitution are made public — let alone all the things that are happening that we don’t know about — it sets a very dangerous precedent,” she added.
In recent days, more than 42,000 people have signed Credo’s petition calling for Obama to “fire” Brennan, along with agency officials who knew about the snooping on Congress. The petition also calls for the Justice Department to file criminal charges against people involved in the congressional snooping.
The spying is just “the latest evidence that America’s shadowy intelligence agencies are out of control,” the group said in its petition. “Yet disturbingly, President Obama is still defending Brennan.”
The administration’s positions have inflamed civil libertarians on both sides of the aisle. But for liberals who supported Obama based in part on his opposition to the powerful security apparatus of the administration of President George W. Bush, the shift is especially painful.
“ It looks incredibly hypocritical relative to the promises he made over the campaign, and that’s completely been made transparent,” said Demand Progress executive director David Segal. “
” It may seem like a drop in the bucket, especially when droves want to immigrate to America. Still, the newly published names of individuals who renounced their U.S. citizenship or terminated long-term U.S. residency is up, with 576 for the quarter and 1,577 so far this year. The growing trend is a sad one as Record Numbers of Americans Are Renouncing Their U.S. Citizenship.
For all the immigrant arrivals, the trickle the other direction is becoming more pronounced. The tally was 2,999 for all of 2013, a 221% increase over the 932 who left in 2012. The Treasury Department is required to publish a quarterly list, a kind of public outing putting Americans on notice of who relinquished their rights. Consular expatriations, where people don’t file exit tax forms with the IRS, are apparently not counted.
Indeed, the Treasury Department’s published list states explicitly this is just those about whom the Secretary of the Treasury has data. It means these numbers are under-stated, some say considerably. Although tax law used to impact how one is taxed on departing the U.S., is no longer relevant why someone expatriates.”
” Since the dawn of the Internet, email users have been haunted by the finality of hitting the “send” button.
What could be the foremost of all First World problems — the inability to retrieve or delete an ill-conceived email — is now a thing of the past for users of Pluto Mail, according to the Harvard law student who created it.
“ I’ve been annoyed with the fact that any email I send lasts forever, and I think Snapchat popularized the more-forgettable Internet, and I thought it would be great to bring it to email. It’s a very salient problem. I think everyone has had this ‘uh oh’ moment,” said David Gobaud, founder and CEO of Pluto Labs Inc. “Basically the Pluto service turns your emails into dynamic ones that you can maintain control over. I built a new email server that turns an email into a living document.”
Gobaud said Pluto Mail allows people with sender’s remorse to edit, delete or set an expiration date on their emails. The product, which was released in early March, already has thousands of users and continues to grow by the day, he said.
Pluto Mail isn’t an email provider but allows users to apply the service to their own email addresses — including Gmail, Outlook and Apple Mail — and then send messages as they normally would. But once the send button is hit, the Pluto Mail user can delete an email’s content, edit it or set an expiration time. The service also informs the sender if the recipient has already opened it. “
” A well known iPhone hacker and forensic scientist has unearthed a range of undocumented and hidden functions in Apple iOS mobile operating system that make it possible for a hacker to completely bypass the backup encryption on iOS devices and can steal large amounts of users’ personal data without entering passwords or personal identification numbers.Data forensics expert named Jonathan Zdziarski has posted the slides (PDF) titled “Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices” showing his findings, from his talk at the Hackers On Planet Earth (HOPE X) conference held in New York on Friday.Jonathan Zdziarski, better identified as the hacker “NerveGas” in the iPhone development community, worked as dev-team member on many of the early iOS jailbreaks and is also the author of five iOS-related O’Reilly books including “Hacking and Securing iOS Applications.”The results of his overall research on the iOS devices indicate a backdoor into iOS device’ operating system, although it is not at all that much widely open as a number of reports have suggested.You can protect your iOS device settings, Messages, Camera Roll, documents, saved games, email account passwords, Wi-Fi passwords, and passwords that you enter into websites using iTunes Backup feature. iTunes also allows users to protect their backup data with an encryption.”
” When the U.S. National Security Agency intercepted the online accounts of legally targeted foreigners over a four-year period it also collected the conversations of nine times as many ordinary Internet users, both Americans and non-Americans, according to a probe by The Washington Post.
Nearly half of those surveillance files contained names, email addresses or other details that the NSA marked as belonging to U.S. citizens or residents, the Post reported in a story posted on its website Saturday night. While the federal agency tried to protect their privacy by masking more than 65,000 such references to individuals, the newspaper said it found nearly 900 additional email addresses that could be strongly linked to U.S. citizens or residents.”
The Snowden revelations continue to reveal the extent of State spying during the Age Of Obama …
” The material reviewed by the Post included roughly 160,000 intercepted e-mail and instant-message conversations, some of them hundreds of pages long, and 7,900 documents taken from more than 11,000 online accounts. It spanned President Barack Obama’s first term, 2009 to 2012, and was provided to the Post by former NSA analyst Edward Snowden.
The daily lives of more than 10,000 account holders who were not targeted were catalogued and recorded, the Post reported. The newspaper described that material as telling “stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes.” The material collected included more than 5,000 private photos, the paper said.”
” As part of the American Civil Liberties Union’s recent report on police militarization, the Massachusetts chapter of the organization sent open records requests to SWAT teams across that state. It received an interesting response.
As it turns out, a number of SWAT teams in the Bay State are operated by what are called law enforcement councils, or LECs. These LECs are funded by several police agencies in a given geographic area and overseen by an executive board, which is usually made up of police chiefs from member police departments. In 2012, for example, the Tewksbury Police Department paid about $4,600 in annual membership dues to the North Eastern Massachusetts Law Enforcement Council, or NEMLEC. (See page 36 of linked PDF.) That LEC has about 50 member agencies. In addition to operating a regional SWAT team, the LECs also facilitate technology and information sharing and oversee other specialized units, such as crime scene investigators and computer crime specialists.
Some of these LECs have also apparently incorporated as 501(c)(3) organizations. And it’s here that we run into problems. According to the ACLU, the LECs are claiming that the 501(c)(3) status means that they’re private corporations, not government agencies. And therefore, they say they’re immune from open records requests. Let’s be clear. These agencies oversee police activities. They employ cops who carry guns, wear badges, collect paychecks provided by taxpayers and have the power to detain, arrest, injure and kill. They operate SWAT teams, which conduct raids on private residences. And yet they say that because they’ve incorporated, they’re immune to Massachusetts open records laws. The state’s residents aren’t permitted to know how often the SWAT teams are used, what they’re used for, what sort of training they get or who they’re primarily used against.”
This is arrogance of the highest order . For any organizations funded by the taxpayers to claim to be private corporations is beyond the pale .
” From the ACLU of Massachusetts’s report on police militarization in that state:
Approximately 240 of the 351 police departments in Massachusetts belong to an LEC. While set up as “corporations,” LECs are funded by local and federal taxpayer money, are composed exclusively of public police officers and sheriffs, and carry out traditional law enforcement functions through specialized units such as SWAT teams . . .
Due to the weakness of Massachusetts public records law and the culture of secrecy that has infected local police departments and Law Enforcement Councils, procuring empirical records from police departments and regional SWAT teams in Massachusetts about police militarization was universally difficult and, in most instances, impossible . . .
Police departments and regional SWAT teams are public institutions, working with public money, meant to protect and serve the public’s interest. If these institutions do not maintain and make public comprehensive and comprehensible documents pertaining to their operations and tactics, the people cannot judge whether officials are acting appropriately or make needed policy changes when problems arise . . . “
This situation cannot be allowed to stand . ALL public servants MUST be held accountable for their actions or are we to believe that these “mercenary” SWAT units are merely rogue privateers issued Letters of Marque ? If such is the case then they are no more than pirates and as such must be fought with all possible means .
Food for thought: If the SWAT teams are private corporations/private contractors , ala Blackwater , then they do not enjoy the legal immunities offered to employees of the State and thus should be subject to civil lawsuits and thus the discovery process … Let the flood gates open .
” The Supreme Court ruled Wednesday that police must obtain warrants before snooping through people’s cellphones, delivering a unanimous decision that begins to update legal understanding of privacy rules to accommodate 21st-century technology.
Police agencies argued that searching through data on cellphones was no different from asking someone to turn out his pockets, but the justices rejected that, saying a cellphone holds the most personal and intimate details of someone’s life and falls squarely within the Fourth Amendment’s privacy protections.
“ The fact that technology now allows an individual to carry such information in his hand does not make the information any less worthy of the protection for which the Founders fought,” Chief Justice John G. Roberts Jr. wrote in the unanimous opinion. “Our answer to the question of what police must do before searching a cell phone seized incident to an arrest is accordingly simple — get a warrant.”
The justices even said police cannot check a cellphone’s call log because it could contain more information than phone numbers, and perusing the call log is a violation of privacy that can be justified only with a court-issued warrant.
Privacy advocates, meanwhile, said the ruling should ignite a broader rethinking of protections at a time when Americans are putting more personal information online.”
Washington Times continues the story of a small step on the road to victory in the war for privacy rights .
” Physicians in California prisons illegally sterilized at least 39 women during an eight-year period, with cases recorded as late as 2011, according to a report put out last week by the state’s own auditing office.
Cynthia Chandler, co-founder of the Oakland-based group Justice Now, which has been raising concerns about prison sterilization processes for years, said that the report’s release “feels like an incredible step and vindication for people who work toward challenging human rights abuses.”
The audit found problems in 39 cases, which account for more than a quarter of the 144 women who underwent the sterilization procedure between fiscal years 2005-6 and 2012-13. In 27 of the cases, inmates’ physicians had failed to sign the necessary consent form detailing that the patients were mentally competent, had understood the lasting effects of the procedure, and that the required 30-day waiting period after initial inmate consent was given had passed. Eighteen cases potentially violated that required waiting period, which is intended to give female prisoners time to think about their decisions before their surgeries take place. In some cases there is even evidence that doctors falsified records, claiming that the waiting period had elapsed when it actually had not.”
” The curled metal fixtures set to go up on a handful of Michigan Avenue light poles later this summer may look like delicate pieces of sculpture, but researchers say they’ll provide a big step forward in the way Chicago understands itself by observing the city’s people and surroundings.
The smooth, perforated sheaths of metal are decorative, but their job is to protect and conceal a system of data-collection sensors that will measure air quality, light intensity, sound volume, heat, precipitation and wind. The sensors will also count people by measuring wireless signals on mobile devices.”
” Some experts caution that efforts like the one launching here to collect data from people and their surroundings pose concerns of a Big Brother intrusion into personal privacy.
In particular, sensors collecting cellphone data make privacy proponents nervous. But computer scientist Charlie Catlett said the planners have taken precautions to design their sensors to observe mobile devices and count contact with the signal rather than record the digital address of each device.”
Chicago Tribune has more on the latest intrusions into personal privacy
” The Pentagon along with the Minerva Research Initiative, appears to have resuscitated and partially reconstituted a 60′s Cold War-era social science program used to detect political protest…
The controversial program called Project Camelot had been operational nearly a decade into the Vietnam war, as the Special Operations Research Office (SORO) located at American University had received millions in funding from the US Army to conduct a six country study on civil unrest. The current social science program directed by Minerva and the Department of Defense (DoD), appears to have also partnered with some of the most well-known universities in the United States by studying the behavior of peaceful activism and how political ideology shapes protest movements in the world at large.
The Minerva Research Initiative has been conducting its studies with the sponsorship of the Department of Defense and its university partners since 2010. This new program has prompted a rebirth of the militarization of social science and in the process has undoubtedly opened a floodgate of ethical concerns. The creation of this partnership was born out of a speech by former Secretary of Defense as well as past Director of the CIA, Robert Gates. In April of 2008, Gates delivered a speech at the Association of American Universities, there he provided a vague outline for research that worked in conjunction with academia and other Pentagon affiliated agencies such as the DoD :
“What we are considering is based to some degree on the success we had in the Cold War. During that period, we built up the Department of Defense’s – and the nation’s – intellectual capital with new research centers such as RAND and new mechanisms like, as I mentioned, the National Defense Education Act. With the Minerva initiative, we envision a consortia of universities that will promote research in specific areas. These consortia could also be repositories of open-source documentary archives. The Department of Defense, perhaps in conjunction with other government agencies, could provide the funding for these projects.”
Read more at 21st Century Wire
” A Brooklyn-based designer has created a 3D-printed sculptural boob tube to spark social commentary on the state of privacy in a data-driven world — by making the top gradually more sheer.”
” X.pose’s striking black webbed rubber structure was engineered using a Stratasys printer, moulded to the body to ensure comfort and very much inspired by creator Xuedi Chen’s previous work, Invasive Growth (moss-grown jewellery based on the parasitic cordyceps fungus). But underneath, its layers tell another story about our lack of control and veritable vulnerability when it comes to who uses our data, what for and how much they take.”
The artist describes her creation thusly …
” x.pose is a wearable data-driven sculpture that exposes a person’s skin as a real-time reflection of the data that the wearer is producing. In the physical realm we can deliberately control which portions our bodies are exposed to the world by covering it with clothing. In the digital realm, we have much less control of what personal aspects we share with the services that connect us. In the digital realm we are naked and vulnerable. “
The Pelletier family of West Hartford has told FOXCT their daughter, Justina, will be returned to her family Wednesday.
Lou Pelletier, Justina’s father, says a juvenile judge issued the order Tuesday afternoon, returning custody of Justina to her parents.
The Pelletiers lost custody 16 months ago to the State of Massachusetts, after disagreements over a medical diagnosis.
Since then, Justina has been in the care of Boston Chrildren’s Hospital and Youth facilities.
I am so happy for Lou and Linda Pelletier. I had several private conversations with Lou during the darkest days, and I can tell you the self-restraint he showed controlling a hurricane of emotions was amazing. He never gave up (the easy part), and he never gave into his anger and outrage (much harder).
Three months ago, in a sharply worded opinion highly critical of the parents’ conduct, the judge gave permanent custody of Justina to the Mass. DCF, and said he believed psychological issues explained much of the teenager’s ailments.
However, top officials at DCF earlier this month filed papers with the judge suggesting the parents had made significant progress and recommended that custody return to the parents.
“ Significant progress?” The parents weren’t doing anything different in June than they were in March. There was no “progress,” just as there was never any–NOT ANY–evidence ever presented that the Pelletiers had been abusing Justina before Massachusetts DCF and Boston Children’s performed their “parentectomy.”
More on this story tomorrow. Meanwhile….FREE AT LAST, FREE AT LAST, THANK GOD ALMIGHTY JUSTINA IS FREE AT LAST! “
Thank you Michael Graham
” By John W. Whitehead
June 16, 2014
“ A standing military force, with an overgrown Executive will not long be safe companions to liberty.”—James Madison
“ Here [in New Mexico], we are moving more toward a national police force. Homeland Security is involved with a lot of little things around town. Somebody in Washington needs to call a timeout.”—Dan Klein, retired Albuquerque Police Department sergeant.
If the United States is a police state, then the Department of Homeland Security (DHS) is its national police force, with all the brutality, ineptitude and corruption such a role implies. In fact, although the DHS’ governmental bureaucracy may at times appear to be inept and bungling, it is ruthlessly efficient when it comes to building what the Founders feared most—a standing army on American soil.
The third largest federal agency behind the Departments of Veterans Affairs and Defense, the DHS—with its 240,000 full-time workers, $61 billion budget and sub-agencies that include the Coast Guard, Customs and Border Protection, Secret Service, Transportation Security Administration (TSA) and the Federal Emergency Management Agency (FEMA)—has been aptly dubbed a “runaway train.”
In the 12 years since it was established to “prevent terrorist attacks within the United States,” the DHS has grown from a post-9/11 knee-jerk reaction to a leviathan with tentacles in every aspect of American life. With good reason, a bipartisan bill to provide greater oversight and accountability into the DHS’ purchasing process has been making its way through Congress.
A better plan would be to abolish the DHS altogether. In making the case for shutting down the de facto national police agency, analyst Charles Kenny offers the following six reasons: one, the agency lacks leadership; two, terrorism is far less of a threat than it is made out to be; three, the FBI has actually stopped more alleged terrorist attacks than DHS; four, the agency wastes exorbitant amounts of money with little to show for it; five, “An overweight DHS gets a free pass to infringe civil liberties without a shred of economic justification”; and six, the agency is just plain bloated.
To Kenny’s list, I will add the following: The menace of a national police force, a.k.a. a standing army, vested with so much power cannot be overstated, nor can its danger be ignored. Indeed, as the following list shows, just about every nefarious deed, tactic or thuggish policy advanced by the government today can be traced back to the DHS, its police state mindset, and the billions of dollars it distributes to police agencies in the form of grants.
Militarizing police and SWAT teams. The DHS routinely hands out six-figure grants to enable local municipalities to purchase military-style vehicles, as well as a veritable war chest of weaponry, ranging from tactical vests, bomb-disarming robots, assault weapons and combat uniforms. This rise in military equipment purchases funded by the DHS has, according to analysts Andrew Becker and G.W. Schulz, “paralleled an apparent increase in local SWAT teams.” The end result? An explosive growth in the use of SWAT teams for otherwise routine police matters, an increased tendency on the part of police to shoot first and ask questions later, and an overall mindset within police forces that they are at war—and the citizenry are the enemy combatants.”
Below are a list of other ways in which the State is busy eroding our Constitutional rights , all explored in greater depth at the Rutherford Institute .
” Spying on activists, dissidents and veterans.
Distributing license plate readers.
Contracting to build detention camps.
Tracking cell-phones with Stingray devices.
Carrying out military drills and lockdowns in American cities.
Using the TSA as an advance guard.
Conducting virtual strip searches with full-body scanners.
Carrying out soft target checkpoints.
Directing government workers to spy on Americans.
Conducting widespread spying networks using fusion centers.
Carrying out Constitution-free border control searches.
Funding city-wide surveillance cameras.
Utilizing drones and other spybots.
It’s not difficult to see why the DHS has been described as a “wasteful, growing, fear-mongering beast.” If it is a beast, however, it is a beast that is accelerating our nation’s transformation into a police state through its establishment of a standing army, a.k.a. national police force.
This, too, is nothing new. Historically, as I show in my book A Government of Wolves: The Emerging American Police State, the establishment of a national police force has served as a fundamental and final building block for every totalitarian regime that has ever wreaked havoc on humanity, from Hitler’s all-too-real Nazi Germany to George Orwell’s fictional Oceania. Whether fictional or historical, however, the calling cards of these national police agencies remain the same: brutality, inhumanity, corruption, intolerance, rigidity, and bureaucracy—in other words, evil. “
Read more here
Revealed: Twin Sisters Lived In Fear Of Bowe Bergdahl’s ‘Stalker’ Father Who Was Caught ‘Peeping Into Their Windows While They Were In The Shower’
” The father of embattled POW Bowe Bergdahl, who landed on US soil today, waged a sinister campaign of stalking and harassment against pretty twin sisters – even stealing a gnome from their garden and peaking at them in the shower, the sisters claim in shocking police reports.
Bearded Robert ‘Bob’ Bergdahl drove by the home of Lacey and Allie Hillman ‘several times a day’ over a period of months and left ‘creepy’ notes for them, the sisters allege in police documents, obtained exclusively by MailOnline.
Once Bergdahl banged on Allie’s door and accused her of ‘two-timing’ him – despite the fact that the pair never dated or were even friends, Allie told police.”
” Expecting House Majority Leader Eric Cantor to win his GOP primary in Virginia, I spent Election Day in Pennsylvania – interviewing angry Republicans, Democrats and independents about the rise of political populism.
I was in the wrong state, but I had the right topic. Cantor’s defeat has less to do with immigration reform than it does with an uneven movement that should frighten conservative and liberal political elites to their shallow cores.
Americans see a grim future for themselves, their children and their country. They believe their political leaders are selfish, greedy and short-sighted – unable and/or unwilling to shield most people from wrenching economic and social change. For many, the Republican Party is becoming too extreme, while the Democratic Party – specifically President Obama – raised and dashed their hopes for true reform.”
Only someone who has lived in a cave for the past twenty years could believe that real change can come from the District of Corruption . Despite the best efforts of the Corporate-State run media to demonize all things Tea Party and despite the occasional drug-addled morons shooting up the neighborhood a la Las Vegas , more and more citizens are coming to the conclusion that the ballot box and the courts offer no recourse …
” At the West Chester’s popular D.K. Diner, a U.S. veteran who served five combat tours in Iraq and Afghanistan said the only solution may be a revolution against political elites. “We may need to drag politicians out and shoot them like they did in Cuba,” said a grim-faced Frederick Derry two days after a Los Vegas couple allegedly shot two police officers. The attackers draped their bodies with a “Don’t Tread on Me” flag, according to ABC News, pinned a swastika on them and a note that read “The revolution has begun.”
A violent revolution is unconscionable. But what may be in the air is a peaceful populist revolt – a bottom-up, tech-fueled assault on 20th century political institutions. In a memo to his fellow Democrats, former Clinton White House political director Doug Sosnik writes persuasively about “an increasing populist push“ across the political spectrum.
At the core of Americans’ anger and alienation is the belief that the American Dream is no longer attainable. Previous generations held fast to the promise that anyone who worked hard and played by the rules could get ahead, regardless of their circumstances. But increasingly, Americans have concluded that the rules aren’t fair and that the system has been rigged to concentrate power and wealth in the hands of a privileged few at the expense of the many. And now the government is simply not working for anyone.”
Sosnik is wrong in that the government is working for some people and some businesses , just not the bulk of the taxpaying public . It’s working just fine if you draw a publicly funded paycheck as a federal employee or are a lobbyist , politician or corporate bigwig . It also works quite well if you happen to be a member of the media elite as the cronyism and nepotism between those two entities is well-documented .
But he is correct in thinking that the time is nigh for the average citizen to choose sides and decide if he/she will indeed take part in the destruction of the barricades .
” Which side of the barricade are you on? Populists from the right and the left – from the tea party and libertarian-leaning Rand Paul to economic populist Elizabeth Warren – are positioning themselves among the insurgents. Sosnik pointed to six areas of consensus that eventually may unite the divergent populist forces:
- A pull back from the rest of the world with more of an inward focus.
- A desire to go after big banks and other large financial institutions
- Elimination of corporate welfare.
- Reducing special deals for the rich.
- Pushing back on the violation of the public’s privacy by the government and big business.
- Reducing the size of government.
In Washington, Cantor’s defeat is being chalked up to the tea party’s intolerance toward immigration reform. While he paid a price for flirting with a White House compromise, Cantor’s greater sin was inauthenticity – brazenly flip-flopping on the issue. Typical politician.”
Mr Fournier’s contention that Elizabeth “Fauxcahontas” Warren is anything but a confirmed Statist aside , we are willing to concede that the lines of battle are being drawn and that there is much common ground to be found between the Occupy crowd and the Tea Partiers .
The question remains , which American personage will be able to unite these disparate interests and lead the charge over the barricades of corruption to reinstate American republicanism and reestablish a nation of limited government .
” Well, this is unfortunate. After yesterday’s back and forth between the DOJ and the EFF over the ongoing destruction of key evidence in the Jewel v. NSA case, the court ordered an emergency hearing for this afternoon. About an hour before the hearing, the DOJ presented its opposition to the temporary restraining order, arguing, basically, that it would be too damn complicated to stop destroying evidence in the case. Part of this is because the data collected under the Section 702 program apparently isn’t just one big database, but is quickly fed into all sorts of other systems.”
Tech Dirt has the whole story . See also :