More terrific research by Michael Ravnitzky has been posted to the Memory Hole. Minutes of the Legislative Reference Service, 1947-1953, The Forerunner of the Congressional Research Service (26 pages, PDF). Continue Reading
More terrific research by Michael Ravnitzky has been posted to the Memory Hole. Minutes of the Legislative Reference Service, 1947-1953, The Forerunner of the Congressional Research Service (26 pages, PDF). Continue Reading
Following up on a controversial demand made by DOJ to major search engine companies for extensive database records, Google this afternoon posted the following response on their official blog: “In August, Google was served with a subpoena from the U. S. Department of Justice demanding disclosure of two full months’ worth of search queries that… Continue Reading
Disaster Preparedness: Preliminary Observations on the Evacuation of Hospitals and Nursing Homes Due to Hurricanes, GAO-06-443R, February 16, 2006. “During disasters, administrators of health care facilities are faced with decisions about how to operate and care for patients, including when and how to evacuate patients if the facility becomes unable to support adequate care, treatment,… Continue Reading
AP: Rockefeller Questions NSA’s Authority Vice Chairman Rockefeller’s Statement on the Senate Intelligence Committee’s Failure to Vote on Whether to Authorize an Investigation into the NSA Surveillance Program New York Times: Senate Chairman Splits With Bush on Spy Program [Please note this AP article adds clarification to Sen. Robert’s position as described in the New… Continue Reading
Corporate Integrity Agreements (CIAS) and Settlement Agreements with Integrity Provisions, 2/16/06. Continue Reading
AP, Judge Weighs Libby’s Request for Documents – The special prosecutor contends that Libby’s demand for unprecedented access to an extensive range of classified White House documents “is a transparent effort at ‘greymail’.” Relevant government documents (via firedoglake): The Classified Information Procedures Act (CIPA) Synopsis of Classified Information Procedures Act (CIPA) Transcript of the CIPA… Continue Reading
FTC press release: “The primary reforms to the merger review process establish presumptions that the FTC will: (1) limit the number of employees required to provide information in response to a second request, provided the party complies with specified conditions; (2) reduce the time period for which a party must provide documents in response to… Continue Reading
Follow-up to a series of recent postings on the growing controversy concerning NASA’s policy to limit public access to accurate scientific documents on global warming. New York Times – Call for Openness at NASA Adds to Reports of Pressure: “Top political appointees in the NASA press office exerted strong pressure during the 2004 presidential campaign… Continue Reading
“Five independent investigators of the United Nations Commission on Human Rights are calling on the United States to close immediately the detention centre in Guantánamo Bay and bring all detainees before an independent and competent tribunal or release them.” (The report, 54 pages, PDF). White House response to the report, Press Briefing by Scott McClellan,… Continue Reading
Follow-up to yesterday’s posting, Investigation into Domestic Spying Program Blocked, today AP reports Justice Argues Against Ashcroft Testimony, and the New York Times reports Senate Panel Decides Against Eavesdropping Investigation, at Least for Now. From AP, this report tonight that addresses the complicated issues involved in the continuing struggle involving the administration, members of Congress… Continue Reading
“In response to a Freedom of Information Act lawsuit (PDF) filed by EPIC, a federal judge has ordered (PDF) the Department of Justice to process and release documents related to the Bush Administration’s warrantless surveillance program by March 8. It is the first court opinion addressing the controversial domestic spying operation. “President Bush has invited… Continue Reading
Responding to Security Incidents on a Large Academic Network: by Jamie Riden 02/14/06 (9 pages, PDF). “This paper describes a series of security incidents on a large academic network, and the gradual evolution of measures to deal with emerging threats.” Continue Reading