Archive for the ‘Government’ Category
For two decades, the U.S. military has been unable to submit to an audit, flouting federal law and concealing waste and fraud totaling billions of dollars
Linda Woodford spent the last 15 years of her career inserting phony numbers in the U.S. Department of Defense’s accounts.
Every month until she retired in 2011, she says, the day came when the Navy would start dumping numbers on the Cleveland, Ohio, office of the Defense Finance and Accounting Service, the Pentagon’s main accounting agency. Using the data they received, Woodford and her fellow DFAS accountants there set about preparing monthly reports to square the Navy’s books with the U.S. Treasury’s – a balancing-the-checkbook maneuver required of all the military services and other Pentagon agencies.
And every month, they encountered the same problem. Numbers were missing. Numbers were clearly wrong. Numbers came with no explanation of how the money had been spent or which congressional appropriation it came from. “A lot of times there were issues of numbers being inaccurate,” Woodford says. “We didn’t have the detail … for a lot of it.”
Do you remember in 2001 just one day before 9-11-2001 Donald Rumsfeld said that the Pentagon cannot account for $2.3 TRILLION…
Oh, gee don’t you think that study confirms what our politicians do too….
From LA Times
College students who cheated on a simple task were more likely to want government jobs, researchers from Harvard University and the University of Pennsylvania found in a study of hundreds of students in Bangalore, India.
Their results, recently released as a working paper by the National Bureau of Economic Research, suggest that one of the contributing forces behind government corruption could be who gets into government work in the first place.
For instance, “if people have the view that jobs in government are corrupt, people who are honest might not want to get into that system,” said Rema Hanna, an associate professor at the Kennedy School of Government at Harvard. To combat that problem, governments may need to find new ways to screen people seeking jobs, she said.
“The bottom line is we’re not broke, there’s plenty of money, it’s just the government doesn’t have it,” said Rep. Keith Ellison (D-Minn.), “The government has a right, the government and the people of the United States have a right to run the programs of the United States. Health, welfare, housing – all these things.”
Back in 1999, it was asserted that backdoors had been built into Windows:
A careless mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA “help information” trapdoor into its Notes system, and that security functions on other software systems had been deliberately crippled.
More recently, there has been concern about Skype, bought by Microsoft in May 2011. In 2012, there were discussions about whether Microsoft had changed Skype’s architecture in order to make snooping easier (the company even had a patent on the idea.) The recent leaks seems to confirm that those fears were well founded
Britain’s spy agency GCHQ has secretly gained access to the network of cables which carry the world’s phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA).
The sheer scale of the agency’s ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate.
One key innovation has been GCHQ’s ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. That operation, codenamed Tempora, has been running for some 18 months.
Download the .zip file with the font here
…The minimization procedures say that the NSA has to destroy the communication it receives once it’s determined as domestic unless they can demonstrate a few facts about it. As part of this, the rules note:
In the context of a cryptanalytic effort, maintenance of technical data basesrequires retention of all communications that are enciphered or reasonably believed to contain secret meaning, and sufficient duration may consist of any period of time during which encrypted material is subject to, or of use in, cryptanalysis.
In other words, if your messages are encrypted, the NSA is keeping them until they can decrypt them. And, furthermore, as we noted earlier, the basic default is that if the NSA isn’t sure about anything, it can keep your data. And, if it discovers anything at all remotely potentially criminal about your data, it can keep it, even if it didn’t collect it for that purpose