Skip to main content

Home/ Politically Minded/ Group items tagged relations

Rss Feed Group items tagged

Skeptical Debunker

For better trade, give peace a chance - 0 views

  • Trade's effect on military conflict is one of the most important issues in international relations. The last decade has seen research and debate into the role of trade intensify; Liberals argue that trade brings peace, neo-realists and neo-Marxists reason that trade brings conflict, and classical realists contend that trade has no impact. This debate is not just academic: some key U.S. policymakers (Senator McCain and former President Clinton for instance) believe that trade brings peace, a view that contributes to their support for free trade. Economists developed bilateral trade models in isolation from models of interstate conflict, which were the work of political scientists. These two types of models handle distance between nations differently. Bilateral trade takes its cue from Isaac Newton's formula for the gravitational attraction between two objects: the larger the objects' masses and the shorter the distance between them, the larger the attraction. So the larger the trade partners' economies and the closer they are to one another, the greater their trade. However, conflict models instead incorporate shared borders by land or close distance over water (contiguity) - stressing the role of border disputes in sparking interstate conflict. Distance is included in conflict equations based on the idea that an army gets weaker the farther it strays from its base, but what point in a nation to pick for the trade and conflict equation is unclear. Often theorists use the distance between capital cities, which is problematic: wars generally happen around borders where armies are often based, and capitals have historically changed without this altering the likelihood of war between the nation and its neighbours. The authors suggest that the trade data set plugged into trade and conflict equations is critical. This type of data often contains gaps - there are a number of reasons why data from a particular nation might be unavailable, inevitably leaving researchers to make assumptions. The majority of trade and conflict studies define conflict to include all types of militarised interstate disputes (MIDs). But Keshk, Reuveny, and Pollins question the results generated when different conflict definitions are chosen. For instance, a conflict such as a threat to use nuclear weapons would not cause fatalities, but may still have some impact on trade and vice versa. In fact, by altering the data treatment and assumptions in the equation, the authors generated a variety of results, which supported several different theoretical viewpoints. The authors suggest that future research should investigate questions of missing bilateral trade data, and attempt a more subtle use of the meaning of "military conflict". Researchers might also develop distance and contiguity measures at a more sophisticated level. "Any signal that trade brings peace remains weak and inconsistent, regardless of the way proximity is modelled in the conflict equation. The signal that conflict reduces trade, in contrast, is strong and consistent," say the authors. "Any study of the effect of trade on conflict that ignores the reverse fact is practically guaranteed to produce estimates that contain simultaneity bias." Studies of the relationship between international trade and military conflict can be traced back many centuries, particularly in the works of luminaries such as de Montesquieu, Immanuel Kant, John Hobson, Vladimir Lenin, Henry Morgenthau, Kenneth Waltz, Frederic List, and Albert Hirschman. This latest study emphasises that international politics are affecting trade between nation pairs, while it is far less obvious whether trade systematically affects politics. "To our colleagues from the liberal camp we would like to say that we still believe there are limited circumstances in which more trade may help lead countries to more peaceful resolutions of their differences, particularly if they are already at peace," the authors state. "However, it is past time for academics and policymakers to look beyond the naive claim that the cultivation of trade ties will always and everywhere produce a more peaceful world."
  •  
    Liberal theorists and politicians have long argued that trade leads to peaceful relations between nations - a view that informs the push for free trade. However, many international relations experts dispute this claim. New US research out today, in the journal Conflict Management and Peace Science published by SAGE, finds that rather than trade being the driver, peace is actually the vital ingredient that allows trade to flourish.
thinkahol *

Walker's Budget Plan is a Three-Part Roadmap for Conservative State Governanc... - 0 views

  •  
    Tim Fernholz wrote an excellent article in the National Journal about the "bait and switch" of Governor Walker's Wisconsin plan. Fernholz points out that the short-term deficit problem can be covered by debt restructuring, and that the big pieces of the bill that relate to dismantling public sector unions, control over Medicaid and creating a no-bid energy asset sale process are not directly budget related. There's a three-prong approach in Governor Walker's plan that highlights a blueprint for conservative governorship after the 2010 election. The first is breaking public sector unions and public sector workers generally. The second is streamlining benefits away from legislative authority, especially for health care and in fighting the Health Care Reform Act. The third is the selling of public assets to private interests under firesale and crony capitalist situations. This wasn't clear to me at first. I thought this was about a narrow disagreement over teacher's unions. Depending on what you read, you may have only seen a few of these parts, and you may have not seen them put together as a coherent whole. This will be the framework that other conservative governors, and even a few Democratic ones, will use in their state, so it is good to get a working model in place. In order to frame where it stands now, I'm going to chart this and give a set of descriptions and must-read links:
hanz444

Hacking, China's maritime claims overshadow Xi's US visit - 0 views

  •  
    BEIJING (AP) - As Chinese President Xi Jinping makes his first state visit to Washington this week, the outlook for relations is decidedly murkier than when he hosted President Barack Obama at their last summit less than a year ago.
  •  
    BEIJING (AP) - As Chinese President Xi Jinping makes his first state visit to Washington this week, the outlook for relations is decidedly murkier than when he hosted President Barack Obama at their last summit less than a year ago.
Ian Schlom

Pakistan urges US to end drone strikes - 0 views

  •  
    inarticle: Pakistan is holding talks with the United States to end drone strikes against suspected Taliban fighters, which sometimes also kill civilians, a senior Pakistani official has said. "Drone attacks are against sovereignty of Pakistan, against international law and against the UN charter," Jalil Abbas Jilani, the administrative head of Pakistan's Foreign Ministry told members of Parliament in Islamabad, the capital. "Innocent people have been killed in these attacks," Jilani said on Friday, adding; "We are having talks with the US to stop the drone attacks and we hope for a positive outcome of the dialogue and hope that drone attacks will stop." The attacks, which are operated by the Central Intelligence Agency (CIA), have strained Pakistan's relations with the US. Pakistan says the attacks violate its sovereignty.
Joe La Fleur

Did Terror-Promoting CAIR Shut Down Pro-Constitution Event? - 0 views

  •  
    COUNCIL on AMERICAN ISLAMIC RELATIONS: CAIR TIED WITH AL QUEDA, HAMAS AND OTHER TERRORIST GROUPS. OBAMA IS A SUPPORTER OF CAIR
Muslim Academy

Salat the Second Pillar of Islam - 0 views

  •  
    'Salat' means five daily prayers prayed regularly in Muslims religion. Its vital meaning is 'supplication'. The prayer indicates various relations with God. Salat is the second pillar of Islam among the five pillars in which Islam based on. It comes after the Kalama, the very first pillar of Islam. The Muslims do their prayer five times in a day. Salat has much religious importance and it saves one from indulgence and horrible work. Student life is the best time when one should learn to control over his evil wants. So, for Muslim students it is must learn the teaching of Salat, for his religious and social welfare. Salat can purify man's life.
Muslim Academy

Democratic State or Islamic State - 0 views

  •  
    What is the relation between Islam and democracy? This is a burning question of this era de facto. There has been already a term "Islamic democracy". This term seems to demand something to add in Islam to be democratic or somehow it means that democracy is very different view where Islam lacks the core insight of democracy. What is the governmental view of Islam? What Islam thinks about the system of government in Islamic state? Does the system ensure the democratic right of the people or more than the so called democratic right? The questions are often and frequently asked by the Muslims as well as Non-Muslims. However, the truth is very significant. Islam is not alike democracy. When you hear about that you get a bad idea and get a sudden shock that Islam is not alike democracy! But let me be a little more specific. The fact is that, Islam is not alike democracy because Islam ensures the rights of the people far better than the western ideas of democracy. The governments of Islamic ages proved what the government system Islam says to adhere. If you notice about the governmental system of Khelfat-e-rasheda, you will get the point how honest they were with their promise and pledges. They ensured all the democratic right of the people. But they were not confined within the system we understand as the unique democratic system rather they were far more better and benevolent ruler of the people.
Muslim Academy

Response - A Response to Islamophobia World - 0 views

  •  
    Islam is a balanced religion. It believes in respecting all sects, all cultures and all civilizations. All laws relate to Islam are meant for Muslim benefits . It is true that in the recent years, Islam has become a victim of extremism. The purpose of Islam has never been to spread Islamophobia. Islamic ideas have been exploited to give them the shape of Islamophobia. Islam does not define a mosque and state as distinctive. A mosque is there, to provide a forum to the Muslim to unite and pray. The gesture is to promote congregational prayers, which is also an aspect of Christianity. Islam does not believe in forcing its concepts upon Non-Muslims. Unethical Jehad has never been an Islamic thought. It is just that some extremist groups are trying to manipulate Islam and use the Ideals to their benefit. Islam believes in respecting all religions. That is what the Holy Prophet (PBUH) taught the Muslims. Islam does not preach unkindness to any. May it be your enemy or slave. These are not the aspects of Jihad. A woman can legally have a physical relationship with her husband only. It is definitely no concept of Jihad. Islam believes in respecting a woman, not exploiting her dignity and respect. Islam does not allow illegal confiscation of property during Jihad. Islam does not promote destruction. Taxes does not mean degrading. Taxes are defined to establish a system and maintain a proper division of wealth. If Christian and jews had to pay Jiziah, Muslims had to pay Zakat .Brutality is not a custom of Islam. A Muslim derives so much contentment from Islamic values, that they do not need to run away from the religion. Anything , which drives a person from sanity is not liked in Islam. The reason being that all wrongs can be committed, when a person is drunk and is not in a normal state of mind. This is human nature, that we cannot drive contentment until we avenge someone for the bad they have done to us. However Islam prefers forgiveness. Sometimes a harsh punishment
Arabica Robusta

Building a civil economy | openDemocracy - 6 views

  • my argument is that humans are more relational, ‘gift-exchanging animals’ who are naturally disposed to cooperate for mutual benefit. In the following I will attempt to show how such an alternative anthropology can translate into a ‘civil economy’ and transformative policy ideas: rebuilding our economy and embedding welfare in communities.
  • In the wake of Marcel Mauss’ work on the gift, this model emerged as a legitimate way of rethinking economics: humans are naturally social animals with dispositions to cooperate in the quest for the common good in which all can partake.
  • Building on Polanyi and G. D. H. Cole’s guild socialism, one can suggest that an embedded model means that elected governments have the duty to create the civic space in which workers, businesses and communities can regulate economic activity and direct the ‘free flow’ of globally mobile capital to productive activities that benefit the many, not the few.
  • ...3 more annotations...
  • At national and supranational levels, caps on interest rates would help curb the predations of creditors upon debtors. Linked to such limits on financial domination are new incentives and rewards for channelling capital in productive, human and social activities.
  • f the declared aim is to preserve the dignity of natural and human life, then all participants in the public realm have a duty to promote human relationships and associations that nurture the social bonds of trust and reciprocal help upon which both democracy and the economy rely.
  • Thus, the link between different actors and levels is a series of abstract, formal rights and entitlements or monetised, market relations (or again both at once). As such, welfare beneficiaries are reduced to merely passive recipients of a ‘one-size-fits-all’, top-down service. State paternalism and private contract delivery cost more to deliver less, and they lock people either into demoralising dependency on the central state or financially unaffordable dependency on outsourced, private contractors.
thinkahol *

Contrary Brin: Can Libertarian Conservatism Find Its Way? - 0 views

  •  
    "This relates to something I have been saying for a long time - that the conservative movement badly needs a counter reformation, an insurrection by reasonable grownups who are brave enough to push back against the forces of bilious unreason and Culture War that have taken over an entire wing of the "left-right spectrum." Is there any hope that this might happen?"
thinkahol *

t r u t h o u t | Do Not Pity the Democrats - 0 views

  •  
    There are no longer any major institutions in American society, including the press, the educational system, the financial sector, labor unions, the arts, religious institutions and our dysfunctional political parties, which can be considered democratic. The intent, design and function of these institutions, controlled by corporate money, are to bolster the hierarchical and anti-democratic power of the corporate state. These institutions, often mouthing liberal values, abet and perpetuate mounting inequality. They operate increasingly in secrecy. They ignore suffering or sacrifice human lives for profit. They control and manipulate all levers of power and mass communication. They have muzzled the voices and concerns of citizens. They use entertainment, celebrity gossip and emotionally laden public-relations lies to seduce us into believing in a Disneyworld fantasy of democracy.
sofarso Shawn

'Critical' period ahead as Iraq gears up for upcoming polls, says UN envoy - 0 views

  •  
    Iraq is entering a critical period as it prepares for upcoming provincial polls, which provide an opportunity to shape a new political landscape in the fledgling democracy, a top United Nations envoy said today, while cautioning that the potential for election-related violence and instability remains.
Skeptical Debunker

Leaked intelligence documents: Here's what Facebook and Comcast will tell the police ab... - 0 views

  • The "Facebook Subpoena/Search Warrant Guidelines" from the Cryptome site are dated 2008, so there's a chance they've been superseded. The document spells out how law enforcement and intelligence agenices should go about requesting information about Facebook users, and details what information is turned over. Following is what Facebook will turn over about you, taken verbatim from the guide: Types of Information Available User Neoprint The Neoprint is an expanded view of a given user profile. A request should specify that they are requesting a “Neoprint of used Id XXXXXX”. User Photoprint The Photoprint is a compilation of all photos uploaded by the user that have not been deleted, along with all photos uploaded by any user which have the requested user tagged in them. A request should specify that they are requesting a “Photoprint of user Id XXXXXX”. User Contact Info All user contact information input by the user and not subsequently deleted by the user is available, regardless of whether it is visible in their profile. This information may include the following: Name Birth date Contact e-mail address(s) Physical address City State Zip Phone Cell Work phone Screen name (usually for AOL Messenger/iChat) Website With the exception of contact e-mail and activated mobile numbers, Facebook validates none of this information. A request should specify that they are requesting "Contact information of user specified by [some other piece of contact information]". No historical data is retained. Group Contact Info Where a group is known, we will provide a list of users currently registered in a group. We will also provide a PDF of the current status of the group profile page. A request should specify that they are requesting "Contact information for group XXXXXX". No historical data is retained. IP Logs IP logs can be produced for a given user ID or IP address. A request should specify that they are requesting the "IP log of user Id XXXXXX" or "IP log of IP address xxx.xxx.xxx.xxx". The log contains the following information: * Script – script executed. For instance, a profile view of the URL http://www.facebook.com/profile.php?id=29445421 would populate script with "profile.php" * Scriptget – additional information passed to the script. In the above example, scriptget would contain "id=29445421" * Userid – The Facebook user id of the account active for the request * View time – date of execution in Pacific Time * IP – source IP address IP log data is generally retained for 90 days from present date. However, this data source is under active and major redevelopment and data may be retained for a longer or shorter period. Special Requests The Facebook Security Team may be able to retrieve specific information not addressed in the general categories above. Please contact Facebook if you have a specific investigative need prior to issuing a subpoena or warrant.
  • Comcast The Comcast document is labeled "Comcast Cable Law Enforcement Handbook," and is dated 2007, so there's a possibility that it, too, has been superseded. As with the other documents, it explains how law enforcement agenices can get information, and details what information is available. There's a great deal of detail in the 35-page document, which describes what Internet, phone, and television information will be turned over. For example, here's the IP information it will make available: Comcast currently maintains Internet Protocol address log files for a period of 180 days. If Comcast is asked to respond for information relating to an incident that occurred beyond this period, we will not have responsive information and can not fulfill a legal request. (Comcast can process and respond to preservation requests as outlined below in this Handbook.) As expected, Comcast will also turn over the emails, including attachments, of those who use Comcast's email service, but "In cases involving another entity’s email service or account, Comcast would not have any access to or ability to access customer email in response to a legal request." Information Comcast turns over to law enforcement agencies varies according to the request. For example, a grand jury subpoena will yield more information than a judicial summons, as you can see in the excerpt below. Comcast notes, though, that this is just a sample, and that "Each request is evaluated and reviewed on a case by case basis in light of any special procedural or legal requirements and applicable laws." So the examples "are for illustration only."
  • For those who worry about privacy, though, all of this information is small potatoes. The real worry is about the use of what are called pen registers or trap-and-trace devices, which essentially capture all of your Internet activity --- the Web sites you visits, the emails you send and receive, IM traffic, downloads, and so on. Here's what the document says about them: Pen Register / Trap and Trace Device Title 18 U.S.C. § 3123 provides a mechanism for authorizing and approving the installation and use of a pen register or a trap and trace device pursuant to court order. All orders must be coordinated prior to submission to Comcast. Law enforcement will be asked to agree to reimburse Comcast's reasonable costs incurred to purchase and/or install and monitor necessary equipment. See "Reimbursement," below.
  • ...2 more annotations...
  • As for your voice calls made via Comcast, here's what the company will turn over: Call Detail Records - Comcast maintains two years of historical call detail records (records of local and long distance connections) for our Comcast Digital Voice telephone service. This includes local, local toll, and long distance records. Comcast also currently provides traditional circuit-switched telephone service branded Comcast Digital Phone. Call detail records for this service are collected by AT&T and are available for approximately two years as well. To determine which type of service is involved, contact the Legal Demands Center—Voice and Video at 800-871-6298. Account Records - Account records are generally stored for approximately two years after the termination of an account. If the account has an outstanding balance due, records may be retained for a longer period of time. As with Internet information, what phone information will be turned over depends on the specific kind of legal request, and the examples "are for information only." Here's an excerpt:
  • And, as you would expect, there is the same pen register/trap-and-trace device language as in the section about the Internet. Oddly enough, it appears that when it comes to information about your television viewing habits, you have more privacy rights than you do when it comes to information about your Internet and voice use, because it can only be turned over in response to a court order, not a subpoena. Here's what the document has to say about TV information: Subscriber Account Identification and Related Records For subscribers to our cable television service, the Cable Act requires Comcast as a cable operator to disclose personally identifiable information to a governmental entity solely in response to a court order (and not, for example, a subpoena) or with the subscriber's express written consent. The Cable Act requires that the cable subscriber be afforded the opportunity to appear and contest in a court proceeding relevant to the court order any claims made in support of the court order. At the proceeding, the Cable Act requires the governmental entity to offer clear and convincing evidence that the subject of the information is reasonably suspected of engaging in criminal activity and that the information sought would be material evidence in the case. See 47 U.S.C. § 551(h). Why does the law give you more privacy protection over your television viewing habits than your Internet or phone use? I haven't a clue --- ask your congressman.
  •  
    Wonder what information Facebook and Comcast will turn over to police and intelligence agencies about you? Cryptome, the site that last week posted the leaked Microsoft "spy" manual, has posted company documents that purport to describe what those companies will reveal about you. As with the Microsoft document, the information is eye-opening.
Skeptical Debunker

Switzerland Keeping the Secrets of Alleged Tax Evaders - Yahoo! News - 0 views

  • Pick a dictator, almost any dictator - Cuba's Fulgencio Batista, the Philippines' Ferdinand Marcos, Haiti's Papa and Baby Doc Duvalier, the Shah of Iran, Central African Republic Emperor Jean-BÉdel Bokassa - and they all have this in common: they allegedly stashed their loot in secret, numbered accounts in Swiss banks, safely guarded by the so-called Gnomes of Zurich. This association - of bank secrecy and crime - has been fed into the public's imagination by dozens of books and movies. It's a reputation that rankles the Swiss, who have a more benevolent view of their commitment to privacy - one that happens to extend to tax privacy. Don't ask, because we won't tell. But the dramatic federal investigation of Switzerland's UBS has blown the lid off bank secrecy - and revealed how Swiss banks abet tax evasion on a far more widespread, if more banal, level. Over the past two decades, these secret banking services have been peddled progressively downmarket - first to the lesser-known fabulously wealthy, then to just the wealthy; more recently, private bankers have been tripping over themselves soliciting business from doctors, lawyers and other folks who are what the biz generally calls "high net worth" individuals. "The IRS has been concerned for decades that a combination of a global economy, the Internet, offshore banking, was really going to take offshore tax evasion from the old so-called 'gentlemen's sport' to tax evasion for the masses," says Mark Matthews, a former deputy IRS commissioner and now a tax attorney with Morgan, Lewis & Bockius LLP.
  •  
    The federal investigation into UBS, which led to a $780 million fine and an agreement to turn over the names of more than 4,450 suspected tax cheats, is now in tatters after Swiss courts ruled against the executive-branch deal. To get around it, a special law has been proposed to accomplish the handoff, but that may not get anywhere in the legislature either. One outcome is already known: tax evasion had become a key service of the Swiss economy, not some isolated event. "They have been outed completely because a very large chunk of their business has been shown to include people cheating on taxes," says Jack Blum, a tax-haven expert. Being "reasonably conservative," he estimates 30% of Swiss banking is related to tax evasion, a figure that jibes with recently released bank data. These revelations come as the financial meltdown has punched a huge hole in projected revenues for governments, which are suddenly a whole lot less tolerant of tax cheats. That's particularly true in Germany, whose wealthy account for a significant portion (at least 10%) of the $1.8 trillion in Swiss banking assets. That translates into hundreds of millions in lost revenue and is the reason the German Finance Minister recently thundered, "There's no future for bank secrecy. It's finished. Its time has run out." The Swiss are not going to be so easily convinced. The Swiss government has already warned that it will not cooperate with German authorities if they go ahead with plans to purchase purloined data about Germans with Swiss bank accounts.
Sana ulHaq

Indian and Pakistani PMs meet - 0 views

shared by Sana ulHaq on 29 Apr 10 - Cached
  •  
    The prime ministers of India and Pakistan have agreed that the two countries relations should be normalised after months of diplomatic deadlock prompted by the attacks on the Indian city of Mumbai in 2008, according to officials.
Aleena Smith

Nokia and Microsoft proclaim 'broad strategic partnership' - 0 views

  •  
    Astonished? Then you have not been attentive. It is been a week of Nokia-related conjecture, mainly happening from a seep out note in which CEO of Nokia Mr. Stephen Elop, who previously effort at Microsoft, contrasted the current predicament of company to a "ablaze platform".
thinkahol *

The military/media attacks on the Hastings article - Glenn Greenwald - Salon.com - 0 views

  •  
    Last June, when Rolling Stone published Michael Hastings' article which ended the career of Obama's Afghanistan commander, Gen. Stanley McChrystal -- an article which was just awarded the prestigious Polk Award -- the attacks on Hastings were led not by military officials but by some of Hastings' most celebrated journalistic colleagues.  The New York Times' John Burns fretted that the article "has impacted, and will impact so adversely, on what had been pretty good military/media relations" and accused Hastings of violating "a kind of trust" which war reporters "build up" with war Generals; Politico observed that a "beat reporter" -- unlike the freelancing Hastings -- "would not risk burning bridges by publishing many of McChrystal's remarks"; and an obviously angry Lara Logan of CBS News strongly insinuated (with no evidence) that Hastings had lied about whether the comments were on-the-record and then infamously sneered:  "Michael Hastings has never served his country the way McChrystal has."  Here's Jon Stewart last year mocking the revealing media disdain for Rolling Stone and Hastings in the wake of their McChrystal story.
thinkahol *

No Other Way Out | Common Dreams - 0 views

  •  
    We will not stop the war in Afghanistan and Iraq, we will not end this slaughter of innocents, unless we are willing to rise up as have state workers in Wisconsin and citizens on the streets of Arab capitals. Repeated and sustained acts of civil disobedience are the only weapons that remain to us. Our political system is as broken and dysfunctional as that once presided over in Egypt by Hosni Mubarak. We must be willing to accept personal discomfort, to put our bodies in the way of the machine, if we hope to expose the lies of war and blunt the abuse by corporate profiteers. To do nothing, to refuse to act, to be passive, is to be an agent of injustice and to be complicit in murder. The U.N. report estimates that during the two-year period it studied almost 1,800 children were killed or injured in conflict-related violence, but numbers can never transmit the reality of such suffering.
thinkahol *

A link between climate change and Joplin tornadoes? Never! - The Washington Post - 0 views

  •  
    Caution: It is vitally important not to make connections. When you see pictures of rubble like this week's shots from Joplin, Mo., you should not wonder: Is this somehow related to the tornado outbreak three weeks ago in Tuscaloosa, Ala., or the enormous outbreak a couple of weeks before that (which, together, comprised the most active April for tornadoes in U.S. history). No, that doesn't mean a thing. It is far better to think of these as isolated, unpredictable, discrete events. It is not advisable to try to connect them in your mind with, say, the fires burning across Texas - fires that have burned more of America at this point this year than any wildfires have in previous years. Texas, and adjoining parts of Oklahoma and New Mexico, are drier than they've ever been - the drought is worse than that of the Dust Bowl. But do not wonder if they're somehow connected.
thinkahol *

Bin Laden's Death: Much More to Say - 0 views

  •  
    After the assassination of bin Laden I received such a deluge of requests for comment that I was unable to respond individually, and on May 4 and later I sent an unedited form response instead, not intending for it to be posted, and expecting to write it up more fully and carefully later on. But it was posted, then circulated. It can now be found, reposted, here.  That was followed by a deluge of reactions from all over the world. It is far from a scientific sample of course, but nevertheless, the tendencies may be of some interest. Overwhelmingly, those from the "third world" were on the order of "thanks for saying what we think." There were similar ones from the US, but many others were infuriated, often virtually hysterical, with almost no relation to the actual content of the posted form letter. That was true in particular of the posted or published responses brought to my attention. I have received a few requests to comment on several of these. Frankly, it seems to me superfluous. If there is any interest, I'll nevertheless find some time to do so.  The original letter ends with the comment that "There is much more to say, but even the most obvious and elementary facts should provide us with a good deal to think about." Here I will fill in some of the gaps, leaving the original otherwise unchanged in all essentials.  Noam Chomsky  May 2011
1 - 20 of 167 Next › Last »
Showing 20 items per page