From WaPo’s Volokh Conspiracy blog:
… (It was an NCIS agent’s) “standard practice to monitor all computers in a geographic area,” here, every computer in the state of Washington …
… The Navy … peeked into every computer in the State of Washington using the peer-to-peer file sharing program, “Gnutella.”
How much of this is routinely done without anyone’s knowledge, let alone oversight, outside of the government agencies involved?
From a Wednesday editorial at Investor’s Business Daily (HT Doug Ross; link added by me; bolds are mine):
… On Monday, the International Association of Information Technology Asset Managers, which deals with such technical questions regarding computer hardware and record retention on a regular basis and which has reacted with the same incredulity as the rest of us, released a list of six basic questions the IRS needs to answer.
1. First, what happened to the IRS’ IT asset managers who seemingly vanished during this critical period? IAITAM , which runs the only worldwide certification program for IT asset managers, says its records show that at least three IRS IT asset managers were moved out of their positions at the time of the May 2013 inspector general’s report that detailed the agency’s targeting practices. What can they tell us?
2. The hard drives in question are federal property and cannot be destroyed or recycled without proper documentation. “Proper IT asset management requires clear proof and records of destruction when drives are wiped or destroyed,” notes IAITAM President and founder Barbara Rembiesa. Where are these records?
3. IAITAM asks if the drives were destroyed by an outside IT asset destruction unit, a not-unusual practice among federal agencies. If so, it adds an entire second layer of documentation of the destruction of these assets, including who approved it.
4. What are the IRS’ specific policies and procedures on document retention when hard drives are damaged or destroyed? In most large private-sector organizations, hard drives and computers are just not tossed in the dumpster or dropped off at the local recycling center until recovery of the lost data is assured.
5. What is the disaster recovery policy at the IRS, an agency responsible for our most sensitive tax information, particularly in light of its statistically implausible number of hard drive crashes?
6. Where are Lerner’s emails from her BlackBerry device and what is on the enterprise server? Some have even suggested Lerner may have off-loaded her emails to what is known as a USB flash drive and still has them in her possession, another federal offense.
The IRS is counting on the general public’s relative ignorance of computer technology to believe its smoke-and-mirror cover-up.
But in the age of the iPad and iPhone, even a child knows that something does not compute here.
Michelle Obama’s overreaching attempts to get people to “eat healthier” have gotten creepy:
The U.S. Department of Agriculture (USDA) is suggesting major changes to grocery stores to “nudge” Americans to purchase healthier foods when they shop.
The agency commissioned an “expert panel” to make recommendations on how to guide the more than 47 million Americans on food stamps into spending their benefits on fruits and vegetables.
The group released an 80-page report this month presenting their ideas, which include talking shopping carts and a marketing strategy for grocery chains that would feature better store lighting for healthier items.
… “These strategies, in particular, draw on principles of behavioral economics to nudge consumers towards healthier choices,” the report said.
The panel came up with six preferred strategies: discount coupons for SNAP recipients; rebates of up to $60 for healthy purchases on EBT cards; buy one get one free deals for SNAP recipients; a targeted marketing plan to promote healthy food; a USDA loyalty card; and new specialized shopping carts.
… The cart would be color-coded, physically divided, and have a system installed so that when the shopping cart reaches its healthy “threshold” it would congratulate the customer.
There is no escaping people who want to treat us all like two year-olds, is there?
This goes back to a week ago Saturday morning, but given the content and that it occurred on a weekend, it really needs more visibility.
On June 28, Juan Williams put in an appearance on a Fox News “Cashin’ In” show panel which discussed the IRS scandal. Host Eric Bolling discussed poll results revealing that three-quarters of Americans believe that the IRS deliberately destroyed emails, and overhwelmingly want to see people involved in destroying the emails to be held accountable. The video after the jump, accompanied by Mediaite coverage containing key quotes, will show that Williams not only insists that he is completely unimpressed with the newsworthiness of the story, but also believe that those who believe it to be important are engaging in a “paranoia conspiracy” (Warning: Those who are on blood pressure meds should make that they have taken them and have allowed enough time to pass for them to achieve their proper effect; bolds are mine):
At a website called Girard at Large in Manchester, New Hampshire, proprietor Richard Girard videotaped and reported on the proceedings of a debate held at St. Anselm’s College on the Common Core educational standards — something you’ll almost never see anyone in the establishment press deign to do.
Girard appropriately described proponents’ descriptions of and arguments in favor of the standards “revealing,” “enlightening,” and “well, frightening.” Perhaps no statement made during the two-hour event Monday contained more of all three adjectives than one made by Dr. David Pook, a teacher at The Derryfield School in Manchester, about what motivated him to get involved with having input into the English Language Arts standards. Brace yourself (HT BizPac Review; specific audio segment is at this link; bolds are mine throughout this post; May 22 Update: Mr. Pook’s comment was slightly revised at the original link for accuracy; that revision is now reflected below):
Via Gateway Pundit, at a post which identifies George Soros-funded groups involved in encouraging/demanding that the IRS go after Tea Party and conservative groups —
The IRS Conservative Targeting Scandal involved (links are in original):
Richard Nixon never got in the neighborhood of doing any of this. Barack Obama’s White House and the IRS out of Washington has orchestrated all of this.
Once again, as it did a month ago in two separate stories, the Associated Press, aka the Administration’s Press, left the name of Lois Lerner, the former IRS official who ran its section on tax-exempt organizations, out of its headline and opening paragraph. This time, for good measure, AP reporter Stephen Ohlemacher didn’t reveal Lerner’s name until Paragraph 3.
Before getting to Ohlemacher’s journalistic malpractice, let’s take a look at the how the Politico handled the same story of Congress holding Ms. Lerner in contempt yesterday, and at one example of how the AP itself covered the story of another controversial figure’s anticipated congressional appearance in the 1980s.
The Obamacare-loving press spares no effort in excusing and minimizing the scheme’s operational, systemic, and law-based failures.
Six months after launch, HealthCare.gov still isn’t functioning as intended. In fact, as of 8:47 a.m. this morning, the time stamp on an Associated Press report (also saved here for future reference, fair use and discussion purposes) by chief wire service Obamacare defender Ricardo Alonso-Zaldivar, the web site wasn’t functioning at all. Did the AP reporter tell readers the system had crashed, or was down? Oh heck no (bolds are mine):
It will go up here at BizzyBlog on Friday (link won’t work until then) after the blackout expires.
Democrat and former Ohio Governor Ted Strickland, who has been “shadowing” Chris Christie while taking every possible opportunity to accuse New Jersey’s GOP Governor of either “lying” or of being “the most inept, incompetent chief executive imaginable,” tried his schtick yesterday morning on Chris Wallace’s Fox News show.
Unfortunately for Ted, establishment Republican and former George W. Bush adviser Karl Rove was there to do what the press should have been doing, namely calling out his blatant hypocrisy. But the clever Strickland managed to get in the last word. Viewers not familiar with the details of how Strickland’s Buckeye State government went after Joe the Plumber after his preelection encounter with Barack Obama in October 2008 will likely believe that the argument ended in a standoff. That situation needs to be remedied.
On Thursday, Stephanie Condon at CBS News reported (“Security chief: HealthCare.gov has passed security testing”) that Teresa Fryer, who had recommended against allowing HealthCare.gov going live before its October launch but was overruled, “told Congress … that the Obamacare website passed security testing in December, and she would recommend that its official Authority to Operate (ATO) be extended when the current ATO expires in March.”
On Friday at the Associated Press, aka the Administration’s Press, Ricardo Alonso-Zaldivar, in an otherwise keister-covering dispatch apparently designed to show that Health and Human Services Secretary Kathleen Sebelius was really, really unaware of the web site’s prelaunch security problems, claimed without qualification that “There have been no successful attacks on the site” — even though by law the government “need never notify customers that their personal information has been hacked or possibly compromised.”
It would appear that Condon and Alonso-Zaldivar deliberately chose to ignore something else which occurred during Thursday’s congressional hearings. Kevin Mitnick, one of the world’s most infamous hackers, “submitted a scathing criticism to a House panel Thursday of ObamaCare’s Healthcare.gov website.” Additionally, on Fox News Sunday, “white hat” hacker David Kennedy contradicted Alonso-Zaldivar’s “no successful attacks” claim by asserting that that the government doesn’t even possess the ability to detect them.
In the competition for most obvious Obama administration apparatchik at the Los Angeles Times (i.e., the biggest tool in the toolbox), Doyle McManus has to be considered a front-runner.
As I noted on Tuesday (at NewsBusters; at BizzyBlog), McManus, in a Sunday column, contended that “President Obama has run into his share of controversies, but none that quite reached scandalhood.” He even petulantly asked, “Does anyone even remember the IRS flap?” McManus was apparently so unconcerned about being seen as inconsistent that he didn’t bother telling readers that he held exactly opposite positions on at least two Obama administration “scandals” — that’s what he called them – just eight months ago (HT to frequent commenter Gary Hall).
Los Angeles Times columnists have produced several delusional doozies in the past few days.
One of the more hysterical came from Doyle McManus on Sunday (“The president’s hump year; The sixth year is often tough, but Obama could triumph”). While acknowledging that “The public’s initial romance with the president has faded” and that “events are in charge now,” he backhandedly described Obama’s presidency thus far as scandal-free. Really (HT to frequent commenter Gary Hall):
Major establishment press outlets ignored Friday’s news that “Teresa Fryer, the chief information security officer for the Centers for Medicare and Medicaid Services (CMS) … explicitly recommended denial of the website’s Authority to Operate (ATO), but was overruled by her superiors.” Fryer also “refused to put her name on a letter recommending a temporary ATO be granted for six months” In other words, HealthCare.gov should not have launched.
Brian Fung at the Washington Post’s “The Switch” blog didn’t consider the idea that HC.gov shouldn’t even have gone live the most important story element. While failing to disclose Fryer’s no-go recommendation and refusal to go along, he and his post’s headline instead obsessed over whether Republican Congressman and House Oversight Committee chair Darrell Issa might “release files” that “could aid hackers.” It wouldn’t be a surprise to learn that hackers already have them, or at least have figured out how to work with or around them. Excerpts follow the jump (bolds are mine):