841

Civil Libertarian
You scored 86% Personal Liberty and 48% Economic Liberty!
A civil libertarian believes in little to no government intervention on personal matters and moderate government intervention on economic matters. As the name implies, a Civil Libertarian’s main concern is with civil liberties – personal matters. They tend to be strongly opposed to war, police powers, victimless crimes, and foreign intervention. Civil Libertarians may tend to believe in a social safety net, but to a lesser extent then most leftists. Strong Civil Libertarians are somewhat inclined towards supporting capitalism as an economic system, while others believe in a “mixed” system between different aspects of capitalism and socialism. A civil libertarian strongly believes in protecting personal liberty. They strongly support self-ownership and privacy.

My test tracked 2 variables How you compared to other people your age and gender:

other other
You scored higher than 99% on Personal
other other
You scored higher than 99% onEconomic

Link: The Politics Test written by brainpolice on OkCupid

Partial List of IP Blocks Used by US “Terrorist Surveillance Program”

The following partial list of IP blocks are routinely used by the US government entities (supported by private contractors) to gain access to, to monitor, and in some cases, to destroy IT networks. Such activity is related to the US “Terrorist Surveillance Program.” Most of the registrants of the blocks listed below are not aware of these activities. Concerned network admins should examine traffic logs closely. A correlation of traffic from several of these IP blocks likely indicates that a network is under surveillance or has had access attempted by the US intelligence community and affiliated entities.

Another thing to note about the program is that access attempts are usually done through Microsoft service ports 1025-1030. Microsoft OS’s allow remote access via these specific ports.

83.27.0.0 – 83.27.255.255
170.86.0.0 – 170.86.255.255
62.212.234.128 – 62.212.234.255
81.57.102.0 – 81.57.103.255
201.5.0.0 – 201.5.255.255
213.151.160.0 – 213.151.191.255
70.83.15.0 – 70.83.15.255
166.128.0.0 – 166.255.255.255
60.64.0.0 – 60.159.255.255
142.191.0.0 – 142.191.255.255
83.65.121.32 – 83.65.121.39
12.108.2.0 – 12.108.3.255
65.128.0.0 – 65.159.255.255
24.158.208.0 – 24.158.223.255
86.97.64.0 – 86.97.95.255
201.239.128.0 – 201.239.255.255
68.36.0.0 – 68.36.255.255
70.44.0.0 – 70.44.255.255
64.231.200.0 – 64.231.203.255
189.128.0.0 – 189.255.255.255
216.155.192.0 – 216.155.207.255
121.6.0.0 – 121.7.255.255
71.96.0.0 – 71.127.255.255
190.213.196.0 – 190.213.196.255
80.72.230.0 – 80.72.230.255
58.29.0.0 – 58.29.255.255
121.128.0.0 – 121.191.255.255
88.191.3.0 – 88.191.248.255
58.72.0.0 – 58.79.255.255
70.16.0.0 – 70.23.255.255
200.57.192.0 – 200.57.255.255
201.5.0.0 – 201.5.255.255
124.168.0.0 – 124.168.255.255
211.200.0.0 – 211.205.255.255
78.252.0.0 – 78.252.255.255
59.0.0.0 – 59.31.255.255
72.64.0.0 – 72.95.255.255
211.200.0.0 – 211.205.255.255
145.53.0.0 – 145.53.255.255
71.200.0.0 – 71.200.127.255
60.206.0.0 – 60.207.255.255
194.178.125.48 – 194.178.125.55
98.226.0.0 – 98.226.255.255
201.88.0.0 – 201.88.255.255
205.209.128.0 – 205.209.191.255
51.0.0.0 – 51.255.255.255
70.64.0.0 – 70.79.255.255
70.112.0.0 – 70.127.255.255
202.84.96.0 – 202.84.127.255
70.32.0.0 – 70.32.31.255
207.218.192.0 – 207.218.255.255
69.31.88.0 – 69.31.89.255
198.74.0.0 – 198.74.255.255
221.0.0.0 – 221.3.127.255
72.144.0.0 – 72.159.255.255
220.96.0.0 – 220.99.255.255
82.88.0.0 – 82.91.255.255
216.128.73.0 – 216.128.73.255

I’ve converted your list to CIDR notation, it’s much more useful this way:

83.27.0.0/16
170.86.0.0/16
62.212.234.128/25
81.57.102.0/23
201.5.0.0/16
213.151.160.0/19
70.83.15.0/24
166.128.0.0/9
60.64.0.0/10
60.128.0.0/11
142.191.0.0/16
83.65.121.32/29
12.108.2.0/23
65.128.0.0/11
24.158.208.0/20
86.97.64.0/19
201.239.128.0/17
68.36.0.0/16
70.44.0.0/16
64.231.200.0/22
189.128.0.0/9
216.155.192.0/20
121.6.0.0/15
71.96.0.0/11
190.213.196.0/24
80.72.230.0/24
58.29.0.0/16
121.128.0.0/10
88.191.3.0/24
88.191.4.0/22
88.191.8.0/21
88.191.16.0/20
88.191.32.0/18
88.191.64.0/17
88.191.128.0/18
88.191.192.0/19
88.191.224.0/20
88.191.240.0/21
88.191.248.0/24
58.72.0.0/13
70.16.0.0/13
200.57.192.0/18
201.5.0.0/16
124.168.0.0/16
211.200.0.0/14
211.204.0.0/15
78.252.0.0/16
59.0.0.0/11
72.64.0.0/11
211.200.0.0/14
211.204.0.0/15
145.53.0.0/16
71.200.0.0/17
60.206.0.0/15
194.178.125.48/29
98.226.0.0/16
201.88.0.0/16
205.209.128.0/18
51.0.0.0/8
70.64.0.0/12
70.112.0.0/12
202.84.96.0/19
70.32.0.0/19
207.218.192.0/18
69.31.88.0/23
198.74.0.0/16
221.0.0.0/15
221.2.0.0/16
221.3.0.0/17
72.144.0.0/12
220.96.0.0/14
82.88.0.0/14
216.128.73.0/24


Ex-Agent Ties Firing to CIA Pressure on WMD
By Chitra Ragavan
February 09, 2007

A federal judge has ruled that a CIA agent identified only as “Doe,” allegedly fired after he gathered prewar intelligence showing that Iraq was not developing weapons of mass destruction, can proceed with his lawsuit against the CIA. The judge has ordered both parties to submit discovery requests–evidence they want for their case–to be completed by March 15, according to the CIA agent’s lawyer and a spokesman for the Justice Department, which is defending the CIA in court.

U.S. District Judge Gladys Kessler issued her ruling after what Doe’s attorney, Roy Krieger, described as an extraordinary, secret status conference by telephone this afternoon that lasted nearly a half an hour. So concerned was the CIA about the agent’s identity becoming public that the Justice Department prevailed upon the judge to issue a highly restrictive order regarding press contacts by the agent and Krieger. The order barred them from “requesting, allowing, encouraging, or directing” any members of the media from appearing at Krieger’s office or even within a two-block vicinity of the building where he works or of any other location of the status conference, until two hours after the conference was completed.

Krieger and his client were also barred from notifying the media ahead of time about the status conference or its location. The judge sealed her order until 2 p.m. today.

“They are worried about his photograph being taken or his likeness being sketched,” Krieger told U.S. News, “because if his appearance became public, we are told we will lose one of our most valued assets because [the asset has] been publicly associated with him.”

At the hearing, Krieger said, Justice Department attorney Marcia Tiersky told Kessler the department wanted to file a motion for summary judgment, leading to dismissal of the case, before discovery commenced. In response to Kessler’s request for a basis for summary judgment, according to Krieger and the Justice Department, Tiersky said that the department would produce affidavits in support of the move. But the judge, indicating that she viewed this as a delaying tactic, said she would allow the discovery process to begin.

This is the second setback for the government in this case. In January, Kessler decided on technical grounds that the CIA employee’s lawsuit could not be dismissed. However, the judge did not rule on the agent’s central claim that he was fired because he refused to alter intelligence that contradicted the Bush administration’s central rationale for the war in Iraq. In that earlier ruling, Kessler said that the covert agent could plausibly argue that his firing was based on allegedly false information placed in his personnel file. Krieger said that his client had gathered intelligence from several countries in the Middle East, including Iraq.

The intelligence was picked up as the United States began its push for invading Iraq in 2003. As has been widely reported, the Bush administration has since failed to find any weapons of mass destruction. The CIA agent has alleged in his suit that supervisors told him they would notify President Bush that he had found contradictory information but that they failed to follow through on their promise.


boytaur dot net?? – somwhere between ZOMG and ROTFLMAO…