Skip to main content

Home/ Politically Minded/ Group items tagged us

Rss Feed Group items tagged

thinkahol *

Glenn Greenwald: With Liberty and Justice for Some | Dylan Ratigan - 0 views

  •  
    How did America come to accept having two classes of citizens?  When did America give up on the dream of fairness for all? Last night after the television show, I got the chance to sit down with Glenn Greenwald to discuss his new book, With Liberty and Justice for Some: How the Law is Used to Destroy Equality and Protect the Powerful. Unfairness in America is nothing new.  In fact, it is perfectly acceptable in this culture for us to admire those who we see as becoming successful and powerful by creating value.  At the same time, Americans accept unfairness with one explicit caveat: that each of us has the chance to be one of those people - that each of us has the opportunity to become successful. What Americans are rejecting now is not wealth disparity, but the corrupt and unethical way so much of the money in this country is now being made, with our government, more often than not, simply looking the other way. Well, Americans are saying "no more" to our government explicitly agreeing to legalize and codify that destructive behavior, protecting powerful political and financial elites while prosecuting ordinary Americans over trivial offenses. We are beginning to see a rejection of this unfairness at Occupy Wall Street and other national reform-based movements.  
Eric G. Young

Let Infographics Convey Information More Clearly Than Words Alone - 0 views

  •  
    As this article from Webdesigner Depot aptly puts it, "Infographics can be a great way to quickly reference information." Infographics take advantage of the adage, "A picture is worth a thousand words," and the can give broader appeal to a message by tapping into the appetites of visually-oriented consumers.\n\nI find infographics particularly useful to help explain difficult or complex topics, and frequently make use of graphics applications like "mindmaps" in my own work. In fact, I wish my primary field would embrace more creative ways of conveying information to consumers and students. The legal world might be surprised to discover how much more interesting and informative the information would be.\n\nThis article contains infographics aimed primarily at web designers and those with a fairly advanced knowledge of technology. However, there are a number of infographics, such as no. 14, which I think do an excellent job of explaining how different social media outlets can be used by a business to attain different marketing goals. It takes no particular technical skill to understand the information displayed in no. 14, which is what makes it a good infographic for anyone.\n\nIf you are interested in this topic professionally, or you just want to look at some interesting graphics that convey information, check out the article. It's worth a look.
thinkahol *

Open proposal to US higher education: end oligarchy economics, save trillions with educ... - 0 views

  •  
    US universities and colleges could end unlawful US wars and stop banksters' rigged-casino fraud if they taught the central facts of these issues. This four-part series of articles is an open proposal for their action. Feel free to share it.
Muslim Academy

Downfall of US dollar and the rise in unemployment rate - 0 views

  •  
    The former U.S. president George Bush once said, "Keeping taxes low and restraining spending leads to a vibrant economy; it leads to new jobs; it leads to better opportunities; and it leads to a shrinking deficit."The former U.S. president George Bush once said, "Keeping taxes low and restraining spending leads to a vibrant economy; it leads to new jobs; it leads to better opportunities; and it leads to a shrinking deficit."
Ian Schlom

Pakistan urges US to end drone strikes - 0 views

  •  
    inarticle: Pakistan is holding talks with the United States to end drone strikes against suspected Taliban fighters, which sometimes also kill civilians, a senior Pakistani official has said. "Drone attacks are against sovereignty of Pakistan, against international law and against the UN charter," Jalil Abbas Jilani, the administrative head of Pakistan's Foreign Ministry told members of Parliament in Islamabad, the capital. "Innocent people have been killed in these attacks," Jilani said on Friday, adding; "We are having talks with the US to stop the drone attacks and we hope for a positive outcome of the dialogue and hope that drone attacks will stop." The attacks, which are operated by the Central Intelligence Agency (CIA), have strained Pakistan's relations with the US. Pakistan says the attacks violate its sovereignty.
Muslim Academy

Urdu Language - 0 views

  •  
    Urdu is not a basic language it is a derived language, actually it is the mixture of many other basic and derived languages like Arabic, Turkish, Persian and Hindi and even there are some words in Urdu which are borrowed from English. The term Urdu was derived from a Turkish word "Ordo", which means camp, army or group. The Urdu language was developed between the Muslim soldiers of the Mughals armies, these soldiers originally belonged to different civilizations and they were Turks, Arabs, Pathans, Persians, Rajputs, Jats, Afghans, Balochis and Punjabis. These soldiers lived together for many years of their lives to fight against their common enemy during which they used to interact with each other by communicating in their respective dialects, which gradually merged into each other and evolved into the present form of Urdu. It is due to this reason that Urdu was first known as "Lashkari Zaban" or the language of the army, which was later changed to "Urdu-e-Muallah" meaning the exalted army which was given by the great Shah Jahan, who was a Mughal Emperor. "Rekhta" meaning scattered was another name used for this language until the present name Urdu came into use.
Muslim Academy

Muslim contributions to the world - 0 views

  •  
    The first word in the holy book of Islam is "Read". So Muslims pay an attention in the study according to Allah's decision. Contributions from the Muslims in world history has been quite remarkable. Particularly, in the field of architecture, Muslims made a great difference. Muslim architecture began with calligraphy during prophet Muhammad. They mainly started it to beautify texts. Later calligraphy decorated different objects such as mosques, houses and much more places. Decoration in Islamic architecture is a major unifying factor. Though Islamic architecture is based on two dimensions, with the use of variations in color and texture, it creates the illusion of different planes. The sense of Geometry helped Muslim architects to use the concept of symmetry and changing scale mirror to create light effects. The use of marble and mosaic is common in Islamic architectures. As Islam spread in the middle east in the early age, the geographical effect of hot climate is quite clear. Fountains and courtyard pools are one of the unique characteristics of Muslim architecture. The presence of water not only beautifies the architectures by creating a reflective effect, but it cools the atmosphere.
Ian Schlom

Pakistan to down American drones, US promises more strikes - 0 views

  •  
    Well. Notice that RT notes that "So far, the only drones making incursions into Pakistani skies have been US Predators used to attack Taliban insurgents." Making this distinction means that UAVs would be flying for a reason distinct from attacking the Taliban, i.e. war with Pakistan. This is in response to the bombing which killed many Pakistani soldiers due to NATO forces fucking up and thinking they were 'terrorists'.
thinkahol *

With Rumored Manhunt for Wikileaks Founder and Arrest of Alleged Leaker of Video Showin... - 0 views

  •  
    Pentagon investigators are reportedly still searching for Wikileaks co-founder Julian Assange, who helped release a classified US military video showing a US helicopter gunship indiscriminately firing on Iraqi civilians. The US military recently arrested Army Specialist Bradley Manning, who may have passed on the video to Wikileaks. Manning's arrest and the hunt for Assange have put the spotlight on the Obama administration's campaign against whistleblowers and leakers of classified information. We speak to Daniel Ellsberg, who's leaking of the Pentagon Papers has made him perhaps the nation's most famous whistleblower; Birgitta Jónsdóttir, a member of the Icelandic Parliament who has collaborated with Wikileaks and drafted a new Icelandic law protecting investigative journalists; and Glenn Greenwald, political and legal blogger for Salon.com. [includes rush transcript]
thinkahol *

YouTube - The End Of America - 0 views

  •  
    More at http://www.theuptake.org ABOUT THIS VIDEO: President Obama's stimulus package is intended not only to shore up the economy, but the U.S. psyche. The American Dream itself. But what if we euthanize the American Dream? The Uptake wants to hear your voice. Submit your own video "letter to the editor." More information: How to submit a video 1) Have something intelligent to say 2) Record it on a video using your real name. 3) Upload it at www.tubemogul.com using info@theuptake.org as your log in and uptake411 as your password. 4) Send an email to info@theuptake.org telling us about your video. Dennis Trainor, Jr is a regular video contributor to TheUptake.org. He was a writer & media consultant for Dennis Kucinich's 2008 presidential campaign & a 2007 "Best of YouTube" nominee for his work as writer/ performer on "The Hermit with Davis Fleetwood." He is currently at work on two books: "My Progressive Dilemma" (chronicling President Obama's 1st year in office) and a novel adapted from his play, "I Coulda Been a Kennedy." Contact: dennistrainorjr (at) gmail (dot) com
thinkahol *

Rally to Restore Sanity - 0 views

  •  
    "I'm mad as hell, and I'm not going to take it anymore!"  Who among us has not wanted to open their window and shout that at the top of their lungs?  Seriously, who?  Because we're looking for those people. We're looking for the people who think shouting is annoying, counterproductive, and terrible for your throat; who feel that the loudest voices shouldn't be the only ones that get heard; and who believe that the only time it's appropriate to draw a Hitler mustache on someone is when that person is actually Hitler. Or Charlie Chaplin in certain roles.  Are you one of those people? Excellent. Then we'd like you to join us in Washington, DC on October 30 -- a date of no significance whatsoever -- at the Daily Show's "Rally to Restore Sanity." Ours is a rally for the people who've been too busy to go to rallies, who actually have lives and families and jobs (or are looking for jobs) -- not so much the Silent Majority as the Busy Majority. If we had to sum up the political view of our participants in a single sentence... we couldn't. That's sort of the point.  Think of our event as Woodstock, but with the nudity and drugs replaced by respectful disagreement; the Million Man March, only a lot smaller, and a bit less of a sausage fest; or the Gathering of the Juggalos, but instead of throwing our feces at Tila Tequila, we'll be actively *not* throwing our feces at Tila Tequila. Join us in the shadow of the Washington Monument. And bring your indoor voice. Or don't. If you'd rather stay home, go to work, or drive your kids to soccer practice... Actually, please come anyway. Ask the sitter if she can stay a few extra hours, just this once. We'll make it worth your while.
Ahmad Al-Shagra

Rumsfeld Knew His Guys Were Torturing People to Death, Which Is a Serious Crime | Corpo... - 0 views

  •  
    According to a poll by Gallup the majority of Americans Want Investigations on Possible attempts to use Justice Dept. for political purposes,use of telephone wiretaps without a warrant use of torture in terror interrogations
Skeptical Debunker

Leaked intelligence documents: Here's what Facebook and Comcast will tell the police ab... - 0 views

  • The "Facebook Subpoena/Search Warrant Guidelines" from the Cryptome site are dated 2008, so there's a chance they've been superseded. The document spells out how law enforcement and intelligence agenices should go about requesting information about Facebook users, and details what information is turned over. Following is what Facebook will turn over about you, taken verbatim from the guide: Types of Information Available User Neoprint The Neoprint is an expanded view of a given user profile. A request should specify that they are requesting a “Neoprint of used Id XXXXXX”. User Photoprint The Photoprint is a compilation of all photos uploaded by the user that have not been deleted, along with all photos uploaded by any user which have the requested user tagged in them. A request should specify that they are requesting a “Photoprint of user Id XXXXXX”. User Contact Info All user contact information input by the user and not subsequently deleted by the user is available, regardless of whether it is visible in their profile. This information may include the following: Name Birth date Contact e-mail address(s) Physical address City State Zip Phone Cell Work phone Screen name (usually for AOL Messenger/iChat) Website With the exception of contact e-mail and activated mobile numbers, Facebook validates none of this information. A request should specify that they are requesting "Contact information of user specified by [some other piece of contact information]". No historical data is retained. Group Contact Info Where a group is known, we will provide a list of users currently registered in a group. We will also provide a PDF of the current status of the group profile page. A request should specify that they are requesting "Contact information for group XXXXXX". No historical data is retained. IP Logs IP logs can be produced for a given user ID or IP address. A request should specify that they are requesting the "IP log of user Id XXXXXX" or "IP log of IP address xxx.xxx.xxx.xxx". The log contains the following information: * Script – script executed. For instance, a profile view of the URL http://www.facebook.com/profile.php?id=29445421 would populate script with "profile.php" * Scriptget – additional information passed to the script. In the above example, scriptget would contain "id=29445421" * Userid – The Facebook user id of the account active for the request * View time – date of execution in Pacific Time * IP – source IP address IP log data is generally retained for 90 days from present date. However, this data source is under active and major redevelopment and data may be retained for a longer or shorter period. Special Requests The Facebook Security Team may be able to retrieve specific information not addressed in the general categories above. Please contact Facebook if you have a specific investigative need prior to issuing a subpoena or warrant.
  • Comcast The Comcast document is labeled "Comcast Cable Law Enforcement Handbook," and is dated 2007, so there's a possibility that it, too, has been superseded. As with the other documents, it explains how law enforcement agenices can get information, and details what information is available. There's a great deal of detail in the 35-page document, which describes what Internet, phone, and television information will be turned over. For example, here's the IP information it will make available: Comcast currently maintains Internet Protocol address log files for a period of 180 days. If Comcast is asked to respond for information relating to an incident that occurred beyond this period, we will not have responsive information and can not fulfill a legal request. (Comcast can process and respond to preservation requests as outlined below in this Handbook.) As expected, Comcast will also turn over the emails, including attachments, of those who use Comcast's email service, but "In cases involving another entity’s email service or account, Comcast would not have any access to or ability to access customer email in response to a legal request." Information Comcast turns over to law enforcement agencies varies according to the request. For example, a grand jury subpoena will yield more information than a judicial summons, as you can see in the excerpt below. Comcast notes, though, that this is just a sample, and that "Each request is evaluated and reviewed on a case by case basis in light of any special procedural or legal requirements and applicable laws." So the examples "are for illustration only."
  • For those who worry about privacy, though, all of this information is small potatoes. The real worry is about the use of what are called pen registers or trap-and-trace devices, which essentially capture all of your Internet activity --- the Web sites you visits, the emails you send and receive, IM traffic, downloads, and so on. Here's what the document says about them: Pen Register / Trap and Trace Device Title 18 U.S.C. § 3123 provides a mechanism for authorizing and approving the installation and use of a pen register or a trap and trace device pursuant to court order. All orders must be coordinated prior to submission to Comcast. Law enforcement will be asked to agree to reimburse Comcast's reasonable costs incurred to purchase and/or install and monitor necessary equipment. See "Reimbursement," below.
  • ...2 more annotations...
  • As for your voice calls made via Comcast, here's what the company will turn over: Call Detail Records - Comcast maintains two years of historical call detail records (records of local and long distance connections) for our Comcast Digital Voice telephone service. This includes local, local toll, and long distance records. Comcast also currently provides traditional circuit-switched telephone service branded Comcast Digital Phone. Call detail records for this service are collected by AT&T and are available for approximately two years as well. To determine which type of service is involved, contact the Legal Demands Center—Voice and Video at 800-871-6298. Account Records - Account records are generally stored for approximately two years after the termination of an account. If the account has an outstanding balance due, records may be retained for a longer period of time. As with Internet information, what phone information will be turned over depends on the specific kind of legal request, and the examples "are for information only." Here's an excerpt:
  • And, as you would expect, there is the same pen register/trap-and-trace device language as in the section about the Internet. Oddly enough, it appears that when it comes to information about your television viewing habits, you have more privacy rights than you do when it comes to information about your Internet and voice use, because it can only be turned over in response to a court order, not a subpoena. Here's what the document has to say about TV information: Subscriber Account Identification and Related Records For subscribers to our cable television service, the Cable Act requires Comcast as a cable operator to disclose personally identifiable information to a governmental entity solely in response to a court order (and not, for example, a subpoena) or with the subscriber's express written consent. The Cable Act requires that the cable subscriber be afforded the opportunity to appear and contest in a court proceeding relevant to the court order any claims made in support of the court order. At the proceeding, the Cable Act requires the governmental entity to offer clear and convincing evidence that the subject of the information is reasonably suspected of engaging in criminal activity and that the information sought would be material evidence in the case. See 47 U.S.C. § 551(h). Why does the law give you more privacy protection over your television viewing habits than your Internet or phone use? I haven't a clue --- ask your congressman.
  •  
    Wonder what information Facebook and Comcast will turn over to police and intelligence agencies about you? Cryptome, the site that last week posted the leaked Microsoft "spy" manual, has posted company documents that purport to describe what those companies will reveal about you. As with the Microsoft document, the information is eye-opening.
Skeptical Debunker

ASUS Bamboo Laptops: Notebook Computing Made Greener |  crispgreen.com - 0 views

  •  
    ASUS has always been known for making some of the best gaming computers in the world. Now they can also be known for making some of the coolest: ASUS now has two notebooks that are built using bamboo - and selling for under $1,000. The ASUS U6V and U2E Bamboo Series Notebook computers use industrial-strength two-year-old Moso bamboo for virtually the entire casing of the product. "We spent the last couple of years perfecting and working with bamboo," said Jonney Shih, Chairmen of ASUSTeK Computer Incorporated. "It is trendy yet responsible." Pound-for-pound, bamboo also has a regeneration rate that is simply unmatched in nature. It has been known to grow two feet in just 24 hours and using less energy in to manufacture than those made out of metal alloys from refined petroleum.
Skeptical Debunker

Drug gangs taking over U.S. public lands | MNN - Mother Nature Network - 0 views

  • BOLD FARMING: Pesticide used at a marijuana grow site in Sequoia National Park in California is prepared for removal by helicopter. (Photo: Gary Kazanjian/AP) Not far from Yosemite's waterfalls and in the middle of California's redwood forests, Mexican drug gangs are quietly commandeering U.S. public land to grow millions of marijuana plants and using smuggled immigrants to cultivate them.   Pot has been grown on public lands for decades, but Mexican traffickers have taken it to a whole new level: using armed guards and trip wires to safeguard sprawling plots that in some cases contain tens of thousands of plants offering a potential yield of more than 30 tons of pot a year.
  •  
    Mexican traffickers have 'supersized' the marijuana trade, using armed guards and trip wires to safeguard plots nestled in national parks, the AP reports.
  •  
    Like the gangsters of prohibition, the only "quick and easy" way to rid ourselves of this pestilence may be legalization.
Sarah Eeee

Income Inequality and the 'Superstar Effect' - NYTimes.com - 0 views

  • Yet the increasingly outsize rewards accruing to the nation’s elite clutch of superstars threaten to gum up this incentive mechanism. If only a very lucky few can aspire to a big reward, most workers are likely to conclude that it is not worth the effort to try.
  • It is true that the nation grew quite fast as inequality soared over the last three decades. Since 1980, the country’s gross domestic product per person has increased about 69 percent, even as the share of income accruing to the richest 1 percent of the population jumped to 36 percent from 22 percent. But the economy grew even faster — 83 percent per capita — from 1951 to 1980, when inequality declined when measured as the share of national income going to the very top of the population.
  • The cost for this tonic seems to be a drastic decline in Americans’ economic mobility. Since 1980, the weekly wage of the average worker on the factory floor has increased little more than 3 percent, after inflation. The United States is the rich country with the most skewed income distribution. According to the Organization for Economic Cooperation and Development, the average earnings of the richest 10 percent of Americans are 16 times those for the 10 percent at the bottom of the pile. That compares with a multiple of 8 in Britain and 5 in Sweden.
  • ...4 more annotations...
  • Not coincidentally, Americans are less economically mobile than people in other developed countries. There is a 42 percent chance that the son of an American man in the bottom fifth of the income distribution will be stuck in the same economic slot. The equivalent odds for a British man are 30 percent, and 25 percent for a Swede.
  • Just as technology gave pop stars a bigger fan base that could buy their CDs, download their singles and snap up their concert tickets, the combination of information technology and deregulation gave bankers an unprecedented opportunity to reap huge rewards. Investors piled into the top-rated funds that generated the highest returns. Rewards flowed in abundance to the most “productive” financiers, those that took the bigger risks and generated the biggest profits. Finance wasn’t always so richly paid. Financiers had a great time in the early decades of the 20th century: from 1909 to the mid-1930s, they typically made about 50 percent to 60 percent more than workers in other industries. But the stock market collapse of 1929 and the Great Depression changed all that. In 1934, corporate profits in the financial sector shrank to $236 million, one-eighth what they were five years earlier. Wages followed. From 1950 through about 1980, bankers and insurers made only 10 percent more than workers outside of finance, on average.
  • Then, in the 1980s, the Reagan administration unleashed a surge of deregulation. By 1999, the Glass-Steagall Act lay repealed. Banks could commingle with insurance companies at will. Ceilings on interest rates vanished. Banks could open branches anywhere. Unsurprisingly, the most highly educated returned to banking and finance. By 2005, the share of workers in the finance industry with a college education exceeded that of other industries by nearly 20 percentage points. By 2006, pay in the financial sector was again 70 percent higher than wages elsewhere in the private sector. A third of the 2009 Princeton graduates who got jobs after graduation went into finance; 6.3 percent took jobs in government.
  • Then the financial industry blew up, taking out a good chunk of the world economy. Finance will not be tamed by tweaking the way bankers are paid. But bankers’ pay could be structured to discourage wanton risk taking
  •  
    (Part 2 of 2 - see first part below) What impact do the incredible salaries of superstars have on the rest of us? What has changed, technologically and socially, to precipitate these inequities? This article also offers a brief look at the relationship between income inequality and economic growth, comparing the US throughout its history and the US vis a vis several European countries.
Sarah Eeee

Income Inequality and the 'Superstar Effect' - NYTimes.com - 0 views

  • In 1982, the top 1 percent of pop stars, in terms of pay, raked in 26 percent of concert ticket revenue. In 2003, that top percentage of stars — names like Justin Timberlake, Christina Aguilera or 50 Cent — was taking 56 percent of the concert pie.
  • . In an article entitled “The Economics of Superstars,” he argued that technological changes would allow the best performers in a given field to serve a bigger market and thus reap a greater share of its revenue. But this would also reduce the spoils available to the less gifted in the business.
  • IF one loosens slightly the role played by technological progress, Dr. Rosen’s framework also does a pretty good job explaining the evolution of executive pay. In 1977, an elite chief executive working at one of America’s top 100 companies earned about 50 times the wage of its average worker. Three decades later, the nation’s best-paid C.E.O.’s made about 1,100 times the pay of a worker on the production line.
  • ...2 more annotations...
  • CAPITALISM relies on inequality. Like differences in other prices, pay disparities steer resources — in this case, people — to where they would be most productively employed.
  • In poor economies, fast economic growth increases inequality as some workers profit from new opportunities and others do not. The share of national income accruing to the top 1 percent of the Chinese population more than doubled from 1986 to 2003.
  •  
    What impact do the incredible salaries of superstars have on the rest of us? What has changed, technologically and socially, to precipitate these inequities? This article also offers a brief look at the relationship between income inequality and economic growth, comparing the US throughout its history and the US vis a vis several European countries. (Part 1 of 2)
thinkahol *

It's Official: Tunisia Now Freer than the U.S. | Informed Comment - 0 views

  •  
    An Arab country with neither secret police nor censorship is unprecedented in recent decades. Tunisia is inspiring similar demands in Egypt and Jordan. When skeptics wonder if the Revolutions of 2011 would really change anything essential in the region, they would be wise to keep an eye on these two developments in Tunisia, which, if consolidated, would represent an epochal transformation of culture and politics. Arguably, Tunisians are now freer than Americans. The US government thinks our private emails are actually public. The FBI and NSA routinely read our email and they and other branches of the US government issue security letters in the place of warrants allowing them to tap phones and monitor whom we call, and even to call up our library records and conduct searches of our homes without telling us about it. Millions of telephone records were turned over to George W. Bush by our weaselly telecom companies. Courts allow government agents to sneak onto our property and put GPS tracking devices under our automobiles without so much as a warrant or even probable cause. Mr. Obama thinks this way of proceeding is a dandy idea.
thinkahol *

Technology: Necessary but Insufficient for Human Survival | Thinkahol's Blog - 0 views

  •  
    In the context of technology the only way out is through. Global society is dependent on artificially inflated energy resources-i.e. oil-that are directly leading us toward total collapse. Technology is being used to most efficiently maximize wealth of the largest corporate conglomerates at the expense of the social fabric and a living environment. The biosphere is in fact collapsing. The technology exists to solve our technical problems but the solutions do not seem like they will be effectively put to use. The power structures concentrating money off the status quo are too entrenched. Each human is called on to become more aware.
thinkahol *

The People's Budget - 0 views

  •  
    Technically, the federal government has now reached the limit of its capacity to borrow money. Raising the debt ceiling used to be a technical adjustment, made almost automatically. Now it's a political football. Democrats should never have agreed to linking it to an agreement on the long-term budget deficit. But now that the debt ceiling is in play, there's no end to what the radical right will demand. John Boehner is already using the classic "they're making me" move, seemingly helpless in the face of Tea Party storm troopers who refuse to raise the ceiling unless they get their way. Their way is reactionary and regressive - eviscerating Medicare, cutting Medicaid and programs for the poor, slashing education and infrastructure, and using most of the savings to reduce taxes on the rich. If the only issue were cutting the federal deficit by four or five trillion dollars over the next ten years, the President and Democrats wouldn't have to cave in to this extortion. That goal can be achieved by doing exactly the opposite of what radical Republicans are demanding. We can reduce the long-term budget deficit, keep everything Americans truly depend on, and also increase spending on education and infrastructure - by cutting unnecessary military expenditures, ending corporate welfare, and raising taxes on the rich. I commend to you the "People's Budget," a detailed plan for doing exactly this - while reducing the long-term budget deficit more than either the Republican's or the President's plan does. When I read through the People's Budget my first thought was how modest and reasonable it is. It was produced by the House Progressive Caucus but could easily have been generated by Washington centrists - forty years ago.
‹ Previous 21 - 40 of 594 Next › Last »
Showing 20 items per page