Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

usonian

usonian's Journal
usonian's Journal
June 24, 2022

EFF's Statement on Dobb's Abortion Ruling

https://www.eff.org/deeplinks/2022/06/effs-statement-dobbs-abortion-ruling
Emphasis mine.

By Cindy Cohn and Corynne McSherry
June 24, 2022

Today's decision deprives millions of people of a fundamental right, and also underscores the importance of fair and meaningful protections for data privacy. Everyone deserves to have strong controls over the collection and use of information they necessarily leave behind as they go about their normal activities, like using apps, search engine queries, posting on social media, texting friends, and so on. But those seeking, offering, or facilitating abortion access must now assume that any data they provide online or offline could be sought by law enforcement.

People should carefully review privacy settings on the services they use, turn off location services on apps that don’t need them, and use encrypted messaging services. Companies should protect users by allowing anonymous access, stopping behavioral tracking, strengthening data deletion policies, encrypting data in transit, enabling end-to-end message encryption by default, preventing location tracking, and ensuring that users get notice when their data is being sought. And state and federal policymakers must pass meaningful privacy legislation. All of these steps are needed to protect privacy, and all are long overdue.

More resources are available at our reproductive rights issue page.
https://www.eff.org/issues/reproductive-rights
June 24, 2022

Reposting: Digital Security and Privacy Tips for Those Involved in Abortion Access

Above all. Facebook and Google track you relentlessly, never delete data and they sell it.

Avoid them if you can. I use duckduckgo for search. They and some others delete all records of search daily or so. It's easy to change your "default search engine". I also use ad-blockers (Purify, ublock-origin) to block tracking bugs on websites.

https://www.eff.org/deeplinks/2022/05/digital-security-and-privacy-tips-those-involved-abortion-access
CC BY license, https://www.eff.org/copyright "You do NOT have to ask permission to post original EFF material on a mailing list or newsgroup"

Legislation deputizing people to find, sue, and collect damages from anyone who tries to help people seeking abortion care creates serious digital privacy and security risks for those involved in abortion access. Patients, their family members and friends, doctors, nurses, clinic staff, reproductive rights activists, abortion rights counselors and website operators, insurance providers, and even drivers who help take patients to clinics may face grave risks to their privacy and safety. Other legislation that does not depend on deputizing “bounty hunters,” but rather criminalizes abortion, presents even more significant risks.

Those targeted by anti-abortion laws can, if they choose, take steps to better protect their privacy and security. Though there is no one-size-fits-all digital security solution, some likely risks are clear. One set of concerns involves law enforcement and state actors, who may have expensive and sophisticated surveillance technology at their disposal, as well as warrants and subpoenas. Because of this, using non-technical approaches in combination with technical ones may be more effective at protecting yourself. Private actors in states with "bounty laws" may also try to enlist a court's subpoena power (to seek information associated with your ISP address, for example, or other data that might be collected by the services you use). But it may still be easier to protect yourself from this “private surveillance” using technical approaches. This guide will cover some of each.

Developing risk awareness and a routine of keeping your data private and secure takes practice. Whether the concern is over digital surveillance, like tracking what websites you’ve visited, or attempts to obtain personal communications using the courts, it’s good to begin by thinking at a high level about ways you can improve your overall security and keep your online activities private. Then, as you come to understand the potential scope of risks you may face, you can narrow in on the tools and techniques that are the best fit for your concerns. Here are some high-level tips to help you get started. We recommend pairing them with some specific guides we’ve highlighted here. To be clear, it is virtually impossible to devise a perfect security strategy—but good practices can help.

1: Compartmentalization

In essence, this is doing your best to keep more sensitive activities separate from your day-to-day ones. Compartmentalizing your digital footprint can include developing the habit of never reusing passwords, having separate browsers for different purposes, and backing up sensitive data onto external drives.

Recommendations:

Use different browsers for different use cases. More private browsers like DuckDuckGo, Brave, and Firefox are better for more sensitive activities. Keeping separate browsers can protect against accidental data spillover from one aspect of your life into another.
Use a secondary email address and/or phone number to register sensitive accounts or give to contacts with whom you don’t want to associate too closely. Google Voice is a free secondary phone number. Protonmail and Tutanota are free email services that offer many privacy protections that more common providers like Gmail do not, such as end-to-end encryption when emailing others also on Protonmail and Tutanota, and fewer embedded tracking mechanisms on the service itself.
Use a VPN when you need to dissociate your internet connection from what you’re doing online. Be wary of VPN products that sell themselves as cure-all solutions.
If you're going to/from a location that's more likely to have increased surveillance, or if you're particularly worried about who might know you're there, turning off your devices or their location services can help keep your location private.

2: Community Agreements

It’s likely that others in your community share your digital privacy concerns. Deciding for yourself what information is safer to share with your community, then coming together to decide what kind of information cannot be shared outside the group, is a great nontechnical way to address many information security problems. Think of it in three levels: what information should you share with nobody? What information is OK to share with a smaller, more trusted group? And what information is fine to share publicly?

Recommendations:

Come up with special phrases to mask sensitive communications.
Push a culture of consent when it comes to sharing data about one another, be it pictures, personal information, and so on. Asking for permission first is a good way to establish trust and communication with each other.
Agree to communicate with each other on more secure platforms like Signal, or offline.

3: Safe Browsing

There are many ways that data on your browser can undermine your privacy and security, or be weaponized against you. Limiting unwanted tracking and reducing the likelihood that data from different aspects of your life spills into one another is a great way to layer on more protection.

Recommendations:

Install privacy-preserving browser extensions on any browsers you use. Privacy Badger, uBlock Origin, and DuckDuckGo are great options.
Use a privacy-focused search engine, like DuckDuckGo.
Carefully look at the privacy settings on each app and account you use. Turn off location services on phone apps that don’t need them. Raise the bar on privacy settings for most, if not all, your online accounts.
Disable the ad identifier on mobile devices. Ad IDs are specifically designed to facilitate third-party tracking, and disabling them makes it harder to profile you. Instructions for Android devices are here, and for iOS devices here.
Choose a browser that’s more private by design. DuckDuckGo on mobile and Firefox (with privacy settings turned up) on the desktop are both good options.

4: Security Checklists

Make a to-do list of tools, techniques, and practices to use when you are doing anything that requires a bit more care when it comes to digital privacy and security. This is not only good to have so that you don’t forget anything, but is extremely helpful when you find yourself in a more high-stress situation, where trying to remember these things is far from the top of your mind.

Recommendations:

Tools: VPNs for hiding your location and circumventing local internet censorship, encrypted messaging apps for avoiding surveillance, and anonymized credit cards for keeping financial transactions separate from your day-to-day persona.
Strategies: use special code words with trusted people to hide information in plain sight; check in with someone via encrypted chat when you are about to do something sensitive; turn off location services on your cell phone before going somewhere, and back up and remove sensitive data from your main device.

* Tails is a portable operating system that protects against surveillance and censorship.
Reply title:

Message text: Other than the obvious, that Facebook is a curse, with no regard to the damage it does until caught.
I am not sure if ad-blockers that block the Facebook "bug" on sites is enough to stop this, and even so, it's a moving target. I can check and update. I have recommended the TAILS distro ( https://tails.boum.org)* to whistleblowers and endangered journalists. But seriously, the average person should not have to resort to such measures for basic protections.

https://www.eff.org/deeplinks/2022/05/digital-security-and-privacy-tips-those-involved-abortion-access
CC BY license, https://www.eff.org/copyright "You do NOT have to ask permission to post original EFF material on a mailing list or newsgroup"

Legislation deputizing people to find, sue, and collect damages from anyone who tries to help people seeking abortion care creates serious digital privacy and security risks for those involved in abortion access. Patients, their family members and friends, doctors, nurses, clinic staff, reproductive rights activists, abortion rights counselors and website operators, insurance providers, and even drivers who help take patients to clinics may face grave risks to their privacy and safety. Other legislation that does not depend on deputizing “bounty hunters,” but rather criminalizes abortion, presents even more significant risks.

Those targeted by anti-abortion laws can, if they choose, take steps to better protect their privacy and security. Though there is no one-size-fits-all digital security solution, some likely risks are clear. One set of concerns involves law enforcement and state actors, who may have expensive and sophisticated surveillance technology at their disposal, as well as warrants and subpoenas. Because of this, using non-technical approaches in combination with technical ones may be more effective at protecting yourself. Private actors in states with "bounty laws" may also try to enlist a court's subpoena power (to seek information associated with your ISP address, for example, or other data that might be collected by the services you use). But it may still be easier to protect yourself from this “private surveillance” using technical approaches. This guide will cover some of each.

Developing risk awareness and a routine of keeping your data private and secure takes practice. Whether the concern is over digital surveillance, like tracking what websites you’ve visited, or attempts to obtain personal communications using the courts, it’s good to begin by thinking at a high level about ways you can improve your overall security and keep your online activities private. Then, as you come to understand the potential scope of risks you may face, you can narrow in on the tools and techniques that are the best fit for your concerns. Here are some high-level tips to help you get started. We recommend pairing them with some specific guides we’ve highlighted here. To be clear, it is virtually impossible to devise a perfect security strategy—but good practices can help.

1: Compartmentalization


In essence, this is doing your best to keep more sensitive activities separate from your day-to-day ones. Compartmentalizing your digital footprint can include developing the habit of never reusing passwords, having separate browsers for different purposes, and backing up sensitive data onto external drives.

Recommendations:

Use different browsers for different use cases. More private browsers like DuckDuckGo, Brave, and Firefox are better for more sensitive activities. Keeping separate browsers can protect against accidental data spillover from one aspect of your life into another.
Use a secondary email address and/or phone number to register sensitive accounts or give to contacts with whom you don’t want to associate too closely. Google Voice is a free secondary phone number. Protonmail and Tutanota are free email services that offer many privacy protections that more common providers like Gmail do not, such as end-to-end encryption when emailing others also on Protonmail and Tutanota, and fewer embedded tracking mechanisms on the service itself.
Use a VPN when you need to dissociate your internet connection from what you’re doing online. Be wary of VPN products that sell themselves as cure-all solutions.
If you're going to/from a location that's more likely to have increased surveillance, or if you're particularly worried about who might know you're there, turning off your devices or their location services can help keep your location private.

2: Community Agreements

It’s likely that others in your community share your digital privacy concerns. Deciding for yourself what information is safer to share with your community, then coming together to decide what kind of information cannot be shared outside the group, is a great nontechnical way to address many information security problems. Think of it in three levels: what information should you share with nobody? What information is OK to share with a smaller, more trusted group? And what information is fine to share publicly?

Recommendations:

Come up with special phrases to mask sensitive communications.
Push a culture of consent when it comes to sharing data about one another, be it pictures, personal information, and so on. Asking for permission first is a good way to establish trust and communication with each other.
Agree to communicate with each other on more secure platforms like Signal, or offline.

3: Safe Browsing

There are many ways that data on your browser can undermine your privacy and security, or be weaponized against you. Limiting unwanted tracking and reducing the likelihood that data from different aspects of your life spills into one another is a great way to layer on more protection.

Recommendations:

Install privacy-preserving browser extensions on any browsers you use. Privacy Badger, uBlock Origin, and DuckDuckGo are great options.
Use a privacy-focused search engine, like DuckDuckGo.
Carefully look at the privacy settings on each app and account you use. Turn off location services on phone apps that don’t need them. Raise the bar on privacy settings for most, if not all, your online accounts.
Disable the ad identifier on mobile devices. Ad IDs are specifically designed to facilitate third-party tracking, and disabling them makes it harder to profile you. Instructions for Android devices are here, and for iOS devices here.
Choose a browser that’s more private by design. DuckDuckGo on mobile and Firefox (with privacy settings turned up) on the desktop are both good options.

4: Security Checklists

Make a to-do list of tools, techniques, and practices to use when you are doing anything that requires a bit more care when it comes to digital privacy and security. This is not only good to have so that you don’t forget anything, but is extremely helpful when you find yourself in a more high-stress situation, where trying to remember these things is far from the top of your mind.

Recommendations:

Tools: VPNs for hiding your location and circumventing local internet censorship, encrypted messaging apps for avoiding surveillance, and anonymized credit cards for keeping financial transactions separate from your day-to-day persona.
Strategies: use special code words with trusted people to hide information in plain sight; check in with someone via encrypted chat when you are about to do something sensitive; turn off location services on your cell phone before going somewhere, and back up and remove sensitive data from your main device.

I have recommended the TAILS distro ( https://tails.boum.org)* to whistleblowers and endangered journalists.
* Tails is a portable operating system that protects against surveillance and censorship.

June 24, 2022

Reposting: Digital Security and Privacy Tips for Those Involved in Abortion Access

Above all. Facebook and Google track you relentlessly, never delete data and they sell it.

Avoid them if you can. I use duckduckgo for search. They and some others delete all records of search daily or so. It's easy to change your "default search engine". I also use ad-blockers (Purify, ublock-origin) to block tracking bugs on websites.

https://www.eff.org/deeplinks/2022/05/digital-security-and-privacy-tips-those-involved-abortion-access
CC BY license, https://www.eff.org/copyright "You do NOT have to ask permission to post original EFF material on a mailing list or newsgroup"

Legislation deputizing people to find, sue, and collect damages from anyone who tries to help people seeking abortion care creates serious digital privacy and security risks for those involved in abortion access. Patients, their family members and friends, doctors, nurses, clinic staff, reproductive rights activists, abortion rights counselors and website operators, insurance providers, and even drivers who help take patients to clinics may face grave risks to their privacy and safety. Other legislation that does not depend on deputizing “bounty hunters,” but rather criminalizes abortion, presents even more significant risks.

Those targeted by anti-abortion laws can, if they choose, take steps to better protect their privacy and security. Though there is no one-size-fits-all digital security solution, some likely risks are clear. One set of concerns involves law enforcement and state actors, who may have expensive and sophisticated surveillance technology at their disposal, as well as warrants and subpoenas. Because of this, using non-technical approaches in combination with technical ones may be more effective at protecting yourself. Private actors in states with "bounty laws" may also try to enlist a court's subpoena power (to seek information associated with your ISP address, for example, or other data that might be collected by the services you use). But it may still be easier to protect yourself from this “private surveillance” using technical approaches. This guide will cover some of each.

Developing risk awareness and a routine of keeping your data private and secure takes practice. Whether the concern is over digital surveillance, like tracking what websites you’ve visited, or attempts to obtain personal communications using the courts, it’s good to begin by thinking at a high level about ways you can improve your overall security and keep your online activities private. Then, as you come to understand the potential scope of risks you may face, you can narrow in on the tools and techniques that are the best fit for your concerns. Here are some high-level tips to help you get started. We recommend pairing them with some specific guides we’ve highlighted here. To be clear, it is virtually impossible to devise a perfect security strategy—but good practices can help.

1: Compartmentalization

In essence, this is doing your best to keep more sensitive activities separate from your day-to-day ones. Compartmentalizing your digital footprint can include developing the habit of never reusing passwords, having separate browsers for different purposes, and backing up sensitive data onto external drives.

Recommendations:

Use different browsers for different use cases. More private browsers like DuckDuckGo, Brave, and Firefox are better for more sensitive activities. Keeping separate browsers can protect against accidental data spillover from one aspect of your life into another.
Use a secondary email address and/or phone number to register sensitive accounts or give to contacts with whom you don’t want to associate too closely. Google Voice is a free secondary phone number. Protonmail and Tutanota are free email services that offer many privacy protections that more common providers like Gmail do not, such as end-to-end encryption when emailing others also on Protonmail and Tutanota, and fewer embedded tracking mechanisms on the service itself.
Use a VPN when you need to dissociate your internet connection from what you’re doing online. Be wary of VPN products that sell themselves as cure-all solutions.
If you're going to/from a location that's more likely to have increased surveillance, or if you're particularly worried about who might know you're there, turning off your devices or their location services can help keep your location private.

2: Community Agreements

It’s likely that others in your community share your digital privacy concerns. Deciding for yourself what information is safer to share with your community, then coming together to decide what kind of information cannot be shared outside the group, is a great nontechnical way to address many information security problems. Think of it in three levels: what information should you share with nobody? What information is OK to share with a smaller, more trusted group? And what information is fine to share publicly?

Recommendations:

Come up with special phrases to mask sensitive communications.
Push a culture of consent when it comes to sharing data about one another, be it pictures, personal information, and so on. Asking for permission first is a good way to establish trust and communication with each other.
Agree to communicate with each other on more secure platforms like Signal, or offline.

3: Safe Browsing

There are many ways that data on your browser can undermine your privacy and security, or be weaponized against you. Limiting unwanted tracking and reducing the likelihood that data from different aspects of your life spills into one another is a great way to layer on more protection.

Recommendations:

Install privacy-preserving browser extensions on any browsers you use. Privacy Badger, uBlock Origin, and DuckDuckGo are great options.
Use a privacy-focused search engine, like DuckDuckGo.
Carefully look at the privacy settings on each app and account you use. Turn off location services on phone apps that don’t need them. Raise the bar on privacy settings for most, if not all, your online accounts.
Disable the ad identifier on mobile devices. Ad IDs are specifically designed to facilitate third-party tracking, and disabling them makes it harder to profile you. Instructions for Android devices are here, and for iOS devices here.
Choose a browser that’s more private by design. DuckDuckGo on mobile and Firefox (with privacy settings turned up) on the desktop are both good options.

4: Security Checklists

Make a to-do list of tools, techniques, and practices to use when you are doing anything that requires a bit more care when it comes to digital privacy and security. This is not only good to have so that you don’t forget anything, but is extremely helpful when you find yourself in a more high-stress situation, where trying to remember these things is far from the top of your mind.

Recommendations:

Tools: VPNs for hiding your location and circumventing local internet censorship, encrypted messaging apps for avoiding surveillance, and anonymized credit cards for keeping financial transactions separate from your day-to-day persona.
Strategies: use special code words with trusted people to hide information in plain sight; check in with someone via encrypted chat when you are about to do something sensitive; turn off location services on your cell phone before going somewhere, and back up and remove sensitive data from your main device.

* Tails is a portable operating system that protects against surveillance and censorship.
Reply title:

Message text: Other than the obvious, that Facebook is a curse, with no regard to the damage it does until caught.
I am not sure if ad-blockers that block the Facebook "bug" on sites is enough to stop this, and even so, it's a moving target. I can check and update. I have recommended the TAILS distro ( https://tails.boum.org)* to whistleblowers and endangered journalists. But seriously, the average person should not have to resort to such measures for basic protections.

https://www.eff.org/deeplinks/2022/05/digital-security-and-privacy-tips-those-involved-abortion-access
CC BY license, https://www.eff.org/copyright "You do NOT have to ask permission to post original EFF material on a mailing list or newsgroup"

Legislation deputizing people to find, sue, and collect damages from anyone who tries to help people seeking abortion care creates serious digital privacy and security risks for those involved in abortion access. Patients, their family members and friends, doctors, nurses, clinic staff, reproductive rights activists, abortion rights counselors and website operators, insurance providers, and even drivers who help take patients to clinics may face grave risks to their privacy and safety. Other legislation that does not depend on deputizing “bounty hunters,” but rather criminalizes abortion, presents even more significant risks.

Those targeted by anti-abortion laws can, if they choose, take steps to better protect their privacy and security. Though there is no one-size-fits-all digital security solution, some likely risks are clear. One set of concerns involves law enforcement and state actors, who may have expensive and sophisticated surveillance technology at their disposal, as well as warrants and subpoenas. Because of this, using non-technical approaches in combination with technical ones may be more effective at protecting yourself. Private actors in states with "bounty laws" may also try to enlist a court's subpoena power (to seek information associated with your ISP address, for example, or other data that might be collected by the services you use). But it may still be easier to protect yourself from this “private surveillance” using technical approaches. This guide will cover some of each.

Developing risk awareness and a routine of keeping your data private and secure takes practice. Whether the concern is over digital surveillance, like tracking what websites you’ve visited, or attempts to obtain personal communications using the courts, it’s good to begin by thinking at a high level about ways you can improve your overall security and keep your online activities private. Then, as you come to understand the potential scope of risks you may face, you can narrow in on the tools and techniques that are the best fit for your concerns. Here are some high-level tips to help you get started. We recommend pairing them with some specific guides we’ve highlighted here. To be clear, it is virtually impossible to devise a perfect security strategy—but good practices can help.

1: Compartmentalization


In essence, this is doing your best to keep more sensitive activities separate from your day-to-day ones. Compartmentalizing your digital footprint can include developing the habit of never reusing passwords, having separate browsers for different purposes, and backing up sensitive data onto external drives.

Recommendations:

Use different browsers for different use cases. More private browsers like DuckDuckGo, Brave, and Firefox are better for more sensitive activities. Keeping separate browsers can protect against accidental data spillover from one aspect of your life into another.
Use a secondary email address and/or phone number to register sensitive accounts or give to contacts with whom you don’t want to associate too closely. Google Voice is a free secondary phone number. Protonmail and Tutanota are free email services that offer many privacy protections that more common providers like Gmail do not, such as end-to-end encryption when emailing others also on Protonmail and Tutanota, and fewer embedded tracking mechanisms on the service itself.
Use a VPN when you need to dissociate your internet connection from what you’re doing online. Be wary of VPN products that sell themselves as cure-all solutions.
If you're going to/from a location that's more likely to have increased surveillance, or if you're particularly worried about who might know you're there, turning off your devices or their location services can help keep your location private.

2: Community Agreements

It’s likely that others in your community share your digital privacy concerns. Deciding for yourself what information is safer to share with your community, then coming together to decide what kind of information cannot be shared outside the group, is a great nontechnical way to address many information security problems. Think of it in three levels: what information should you share with nobody? What information is OK to share with a smaller, more trusted group? And what information is fine to share publicly?

Recommendations:

Come up with special phrases to mask sensitive communications.
Push a culture of consent when it comes to sharing data about one another, be it pictures, personal information, and so on. Asking for permission first is a good way to establish trust and communication with each other.
Agree to communicate with each other on more secure platforms like Signal, or offline.

3: Safe Browsing

There are many ways that data on your browser can undermine your privacy and security, or be weaponized against you. Limiting unwanted tracking and reducing the likelihood that data from different aspects of your life spills into one another is a great way to layer on more protection.

Recommendations:

Install privacy-preserving browser extensions on any browsers you use. Privacy Badger, uBlock Origin, and DuckDuckGo are great options.
Use a privacy-focused search engine, like DuckDuckGo.
Carefully look at the privacy settings on each app and account you use. Turn off location services on phone apps that don’t need them. Raise the bar on privacy settings for most, if not all, your online accounts.
Disable the ad identifier on mobile devices. Ad IDs are specifically designed to facilitate third-party tracking, and disabling them makes it harder to profile you. Instructions for Android devices are here, and for iOS devices here.
Choose a browser that’s more private by design. DuckDuckGo on mobile and Firefox (with privacy settings turned up) on the desktop are both good options.

4: Security Checklists

Make a to-do list of tools, techniques, and practices to use when you are doing anything that requires a bit more care when it comes to digital privacy and security. This is not only good to have so that you don’t forget anything, but is extremely helpful when you find yourself in a more high-stress situation, where trying to remember these things is far from the top of your mind.

Recommendations:

Tools: VPNs for hiding your location and circumventing local internet censorship, encrypted messaging apps for avoiding surveillance, and anonymized credit cards for keeping financial transactions separate from your day-to-day persona.
Strategies: use special code words with trusted people to hide information in plain sight; check in with someone via encrypted chat when you are about to do something sensitive; turn off location services on your cell phone before going somewhere, and back up and remove sensitive data from your main device.

I have recommended the TAILS distro ( https://tails.boum.org)* to whistleblowers and endangered journalists.
* Tails is a portable operating system that protects against surveillance and censorship.

June 23, 2022

Photography is Patience and Persistence, and then

cool stuff happens.

This is Half Dome from the Yosemite Conservancy webcam. (All credit to them for the photo.)
https://yosemite.org/

snap:


Yosemite webcams are listed and linked here, along with park info.
https://www.nps.gov/yose/learn/photosmultimedia/webcams.htm
Those are live links, so they go very dark at night.

June 20, 2022

WINNING BEATS WHINING. YOU have the power. To Get Out The Vote.

Reposting for visibility, as requested.
Please reply with any additions or updates.

GOTV as if your life and the lives of many others depend on it
BECAUSE THEY DO

Donating to DNC is always effective, but there's always more to do. Here is a list of what I've found. Adding to it as I find actionable items.

VERY VERY LATEST!
Dems launch plan to elect thousands of local election supervisors
Protect Elections from thuggery.
DU post by mahatmakanejeeves
https://democraticunderground.com/10142905218
Politico article: https://www.politico.com/news/2022/04/18/democrats-recruiting-push-local-election-officers-00025733

A Democratic candidate recruiting group is pitching donors on an ambitious three-year program to find, train and support 5,000 candidates for local offices in charge of election administration, a sprawling national effort intended to fight subversion of future election results.

The program would recruit candidates in 35 states for everything from county probate judges in Alabama to county clerks in Kansas and county election board members in Pennsylvania — all offices that handle elections and will be on voters’ ballots between now and 2024.

RUN FOR SOMETHING:
https://runforsomething.net/
SIGN UP, AND RUN!
https://wherecanirun.org/

FIGHT FOR VOTING RIGHTS
After a year of assaults on American voting rights, the next steps are clear: end the filibuster and enact federal voting rights legislation that protects voters, no matter what state they live in.
https://naacp.org/campaigns/civil-rights-scorecard

VERY LATEST!
(updated June 20, 2022)
Omaha Steve has an updated list of all current ActBlue DU links for donations,
https://democraticunderground.com/100216821075
Includes Ukraine!
(see below for the first five I collected)

OTHER LISTS!
CrispyQ has assembled a great list here:
https://democraticunderground.com/100216548509

LATEST
Progressive Turnout Project is the largest voter contact organization in the country, specifically dedicated to mobilizing the Democratic Party and defending democracy.
Our mission: rally Democrats to vote.
https://www.turnoutpac.org/
From Wednesdays.


I WHOLEHEARTEDLY SUPPORT Rev. Senator Warnock!
Read the letter that Omaha Steve got from Senator Warnock. (GA)
https://democraticunderground.com/100216555367
AND KEEP THE SENATE BLUE AND TRUE
https://secure.actblue.com/donate/duforwarnock (Pinback's DU for Warnock site)
Senator Warnock's official campaign site:
https://warnockforgeorgia.com/

NEW OFFICIAL Democratic Underground for Beto O'Rourke Governor Texas 2022
Donate here: https://secure.actblue.com/donate/du4beto
(There are other Beto links below, FYI)

The DU has a new Stacey Abrams for Governor of GA ActBlue donation link!
Donate here: https://secure.actblue.com/donate/duforstaceyabrams

https://democraticunderground.com/100216519360
Carol Blood will be facing a hardline conservative for Governor of Nebraska.
Donate to Carol here: https://secure.actblue.com/donate/duforblood
Here is her site: https://www.electcarolblood.com/

UPDATED!
OFFICIAL DU ActBlue for Tim Ryan US Senate from Ohio
https://secure.actblue.com/donate/demsrule86forryan
OFFICIAL Democratic Underground for Ohio Senate 2022
https://secure.actblue.com/donate/duohiosenate22
Tim's page: https://timforoh.com/

NEW!
Courtesy of Tommymac
#GOTV2022 Resources:
https://runforsomething.net/
https://www.rockthevote.org/
https://swingleft.org/
https://events.democrats.org/
https://www.democratsabroad.org/voting_news
https://www.padems.com/
https://www.texasdemocrats.org/
https://vademocrats.org/
https://www.georgiademocrat.org/take-action/
https://www.floridadems.org/get-involved/
https://www.ncdp.org/resources/
Awesome.

NEW!
https://democraticunderground.com/100216468060
If you haven't attended any DNC organizing or training sessions, you're missing out!!!
And we need EVERYBODY. I just got done with a Social Media Ambassador training. They have AWESOME tools to use on social media.
Thank you, CousinIT!



NEW!
https://www.dailykos.com/stories/2022/3/9/2084766/-To-elect-a-progressive-majority-we-need-to-flip-North-Carolina-s-open-Senate-seat
Want to end the filibuster? Then help this fantastic Senate candidate beat the GOP
Progressives have two goals when it comes to the Senate this year: preserving our current majority, and making sure our next majority supports reforming the filibuster. Fortunately, this year’s race in North Carolina gives us the chance to do both, which is why Daily Kos is proud to endorse former state Supreme Court Chief Justice Cheri Beasley in her bid to flip this open seat from the GOP.
ActBlue link
https://secure.actblue.com/donate/dkendorses2022beasley?refcode=20220309fpdn1foot

NEW!
https://democrats.org/act/?permalink=volunteer-to-protect-democratic-majorities
Volunteer To Protect Democratic Majorities (DNC)
DNC sent this list of items you can sign up to do. (I pasted a copy of it at the bottom of this post)

NEW!
https://m.dailykos.com/stories/2022/3/6/2083529/-Wasting-90-million-or-investing-90-thousand-How-to-win-in-every-corner-of-the-country
How to win in every corner of the country.

So we came up with a three-pronged strategy:

1) All Politics Are Local: ... it requires local control and a local touch on messaging and campaign infrastructure to truly be successful.

2) Training: We wanted to find grassroots activists and volunteers, to give them as much knowledge and experience as we could.

3) Unconventional campaigning: We knew we couldn’t win a toe-to-toe fight, so we had to take every weakness and make it a strength.


NEW!
https://betoorourke.com/
Beto For Texas

https://act.betoorourke.com/signup/bft-volunteer/
Volunteer

https://secure.actblue.com/donate/bft-website
Donate via ActBlue

https://democraticunderground.com/100216417431
10 Things You Can Do To Defend Democracy
Source: https://liberalarts.tamu.edu/blog/2022/02/28/10-things-you-can-do-to-defend-democracy/
General, but good.

https://m.dailykos.com/stories/2022/2/19/2081124/-Democrats-can-win-in-November-but-all-of-us-need-to-roll-up-our-sleeves-to-help-kick-some-GOP-butt
Democrats can win in November, but all of us need to roll up our sleeves to help kick some GOP butt

https://postcardstovoters.org

https://www.democraticunderground.com/100216345614
Don't just complain, do something. Help GOTV!

https://upload.democraticunderground.com/100216311744
We're Not Going To Win If We Keep Saying We're Losing

https://www.democraticunderground.com/100216219159
President Joe has me Fired up. I'm ready to get off my arse and GOTV for 2022 right now.

https://www.democraticunderground.com/100215975225
Doom posting is voter suppression.


ITEMS YOU CAN SIGN UP TO DO FROM DNC
How would you like to volunteer? (Check all that apply)
Become a social ambassador
Make calls
Host an event
Organize friends
Send texts
Organize in your community

• I am a Spanish speaker (Y/N)

If you'd like to organize around a specific community, select all that apply:
Black
Latino
AAPI
Native American
Women
LGBTQIA+
Youth
Disability
Rural
Small Business
Climate
Seniors
Veterans
Other



Guy Kawasaki, an early Apple employee, wrote an article entitled: Don't Kvetch, Kick Butt
I approve of his message.
June 19, 2022

As promised, another great hummingbird going daisy crazy.


Happy Father's Day and Juneteenth photo.
I'll try to get some more.
I got a shutter speed of 1/500 second so the wings are less blurred.
Enjoy!
June 18, 2022

This morning's brunch at the Daisy Cafe.

I skipped over some photos I have "in the can" to post this morning's shot.
Landing gear retracted! Cool.
Enjoy. More to come.



June 18, 2022

PLAY HARDBALL

edit:
WARNING! Hyperbole below!
I edited to make the counterproposals less extreme, but please, no more milquetoast.

Thanks!

--------

Democratic leadership always seems to be painted into a corner.

How about proposing

• A bill that eliminates the capital gains tax, AND BANS ASSAULT WEAPONS.
LET THE BASTARDS VOTE IT DOWN.

• A bill that doubles oil and gas subsidies, AND GUARANTEES REPODUCTIVE RIGHTS.
LET THE BASTARDS VOTE IT DOWN.

• A bill that pardons all Jan 6 participants, AND GUARANTEES VOTING RIGHTS.
LET THE BASTARDS VOTE IT DOWN.

• And so on.

How can we let bozos with the emotional and mental maturity of a 4 year-old outfox us? (they're an insult to 4-year olds)

From DKos:
https://www.dailykos.com/stories/2022/6/17/2104746/-WTF-Democratic-Leadership
WTF, Democratic Leadership?

snip


Honestly, you really don’t get this? No bill is going to pass. So define Republicans with it and energize your base by growing a spine. Dare Repubicans block it. They don’t think you have the stones. Then when they do, go on every news program on cable, on every Sunday talk show, and write Op-Eds in every newspaper from now until the midterms about how Republicans are blocking meaningful gun legislation. Say it in a few words without going into the weeds. Here’s an example:

Democrats have passed a common sense gun reform bill supported by the overwhelming majority of Americans. Repubicans have blocked it at every turn because they value guns more than the lives of our children. Republicans won’t even agree to debate it!

And for crying out loud, use the word “Republican.”

Not “Congress.”

Not “GOP.”

And for fuck sake, not “Our friends on the other side of the isle.”

Republicans.

Republicans are the hold up.

Republicans are extreme.

Republicans are why we can’t have nice things.

Republicans are why our kids are being slaughtered in our schools.

Honestly Democrats, its just not that fucking hard. Our kids are dying.

You want a true majority in the Senate not controlled by millionaire coal Barron Joe Manchin? Do this and maybe Democrats will have a chance.

Keep giving Republicans political cover and the ability to delay any action and we’re all toast.

unsnip

So, battling people who are COMPLETELY PREDICTABLE, and they outfox you?




June 18, 2022

Flaps down, reverse thrust, and prepare to ......... have lunch!

One in a series of "hummingbird loves daisies" photos.

They move so fast that it's hard to even find them, let alone focus.
I want to give Nikon credit for their autofocus with the (old) Coolpix. I aimed, clicked and hoped for the best, and mostly got it. Enjoy!

June 18, 2022

Is that a pardon in your pocket, or are you just glad to speak to the committee?

Proposition: If any of the actors speak to the committee, they have a pardon in their pocket, and have "nothing to lose".

Otherwise, they take the fifth, because they DO have something to lose. (not accusing anyone of anything, just the matter of pardons, OK?)

I am curious because someone mentioned that Gin and Tonic would be glad to speak.

And isn't that a way to figure out the "secret list"?

Profile Information

Member since: Mon Oct 11, 2021, 04:41 PM
Number of posts: 9,782
Latest Discussions»usonian's Journal