Skip to main content

Home/ Politically Minded/ Group items matching "Makings" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
2More

Oil and Israel :: SANDERS RESEARCH ASSOCIATES LTD. - 0 views

  • two camps: securing oil or  securing Israel. In reality, the war is being fought to secure oil through  Israel. US foreign policy is geared to make Israel its primary transport  route for Middle Eastern and Central Asian oil. This also accomplishes two Israeli aims: ending dependence on US aid and toppling uncooperative neighbors.
    • Arne Løining
       
      Third: Greater Israel as the only superpower in the middle-east
4More

Obama the Delegator Picks When to Take Reins - NYTimes.com - 0 views

  • He does not stir dissent simply for dissent’s sake, but often employs a Socratic method of discussion, where aides put ideas forward for him to accept or reject. Advisers described his meetings as “un-Clintonesque,” a reference to the often meandering, if engrossing, policy discussions Bill Clinton presided over when he was president.
  • But Mr. Obama’s ease belies a more controlling management style. For all the success his campaign has enjoyed with grass-roots organizing, the operation is highly centralized around Mr. Axelrod; David Plouffe, the campaign manager; Robert Gibbs, the communications director; Pete Rouse, his Senate chief of staff; Valerie Jarrett, a longtime friend from Chicago; and a handful of senior advisers that has barely changed since he opened his campaign in January 2007.
  • Mr. Obama’s circle of advisers takes seriously his “no drama” mandate. It is a point of pride in his campaign that there have been virtually no serious leaks to the news media — small leaks are immediately investigated — about internal division or infighting. He is a careful reader of daily newspapers and magazines (titles from Foreign Affairs to Maxim are stocked on his campaign plane). He takes his briefing books — three-ring binders filled with political memorandums and policy discussions — to his hotel room or home every night, but aides say how well he reads the materials may depend on what is on ESPN.
  • ...1 more annotation...
  • “He’ll say, ‘that is not my voice,’ ” said Jim Margolis, a senior media consultant to Mr. Obama who oversees television advertising. “Definitely this isn’t somebody you just throw the script to and he’ll say anything that comes up on the screen. He tries to make sure that he’s got his imprint on it.”
1More

Mark Kleiman: Changing the topic - Politics on The Huffington Post - 0 views

  • Coincidentally, on the very same day the Financial Times reported that UBS had advised 50 current and former employees of its private banking group not to travel to the United States. The bank is worried that they might be arrested in connection with a massive tax-evasion scheme under which UBS helped rich Americans cheat the IRS, thus making sure that the rest of us suckers had to pay for, e.g., the War in Iraq. Some of the clients of the scheme are already testifying before a grand jury, and a senior UBS official has already been indicted. UBS is offering to provide lawyers for all of the suspects. Now, how is it that Gramm got to be Vice-Chairman of UBS? Why, by being the chief author of the banking-deregulation legislation (the repeal of the Glass-Steagall Act) that made so many bankers rich and helped create the crisis McCain doesn't want to do anything about. In keeping with McCain's decision to purge "lobbyists" from his campaign, Gramm had himself de-registered as a lobbyist. But he's still Vice Chairman of UBS, and still McCain's chief economic adviser. All the de-listing means is that he can't now personally call Congressmen or Senators; no doubt his staff can handle such details for the next few months.
1More

Donklephant » Blog Archive » CBS Snap Debate Poll: Obama 39%, McCain 27% - 0 views

  • Here are the numbers from a poll of 500 uncommitted voters… How did the debate impact vote preferences? 15% say they are now committed to Obama 14% to McCain 70% are still uncommitted Would make the right decisions about the economy? McCain: 41% before the debate, 49% after Obama: 54% before the debate, 68% after Understands your needs? McCain: 35% before the debate, 46% after Obama: 60% before the debate, 80% after Prepared for the job of president? McCain: 80% before the debate, 84% after Obama: 42% before the debate, 57% after Did candidates answer the questions they were asked? 57% yes, 42% no — for both candidates Obama continues to dominate the “economic” and “understands my needs” categories.
23More

Tom Watson MP » Blog Archive » Power of Information: New taskforce and speech - 0 views

  • We commissioned Ed Mayo and Tom Steinberg to write the Power of Information report because we knew that information, presented in the right way, was a potent driver for improving public services and government.
  • Today I am going to offer two arguments that I think compliment the Prime Minister’s recent announcement on public service reform
  • Firstly, that freeing up data will allow us to unlock the talent British entrepreneurs. And secondly, engaging people - using the simple tools that bring them together - will allow the talents of all our people to be applied to the provision of public services.
  • ...20 more annotations...
  • The difference of course is that today we contend with what Richard Saul Wurman describes as a ‘tsunami of data’
  • My job is to make sure that government can benefit from this new thinking too. When we were first elected in 1997 people had a recipient relationship with data, they got what they were given when they were given it. It was static.
  • In scale, the spread of social media is comparable to the spread of telephones in the 1930’s to the 1950’s. Yet it’s happened in two years not 20.
  • As Clay Shirky would say, we’ve reached a point where technology is simple and boring enough to be socially useful and interesting.
  • Over 7 million electronic signatures have been sent, electronically, to the Downing Street petition website. 1 in 10 citizens have emailed the Prime Minister about an issue. The next stage is to enable e-petitioners to connect with each other around particular issues and to link up with policy debates both on and off Government webspace.
  • Only last week, the Prime Minister became the first head of Government in Europe to launch his own channel on Twitter, which I can tell you from experience, is extremely useful to his ministers at least
  • Richard is here tonight and I hope that after the formal proceedings you might like to share some of your own ideas with him. Richard is also joined by a number of other taskforce members. They’re all people with remarkable track records in this field. We’re lucky. The UK has some of the world’s leading talent.
  • And today the PM announced an initiative that would allow you to find your community Bobbies using your postcode.
  • The taskforce will bring its expertise to bare on existing initiatives to see if we can what we already do better
  • I want the taskforce to ensure that the COI and Cabinet Office produce a set of guidelines that adheres to the letter of the law when it comes to the civil service code but also lives within the spirit of the age. I’ll be putting some very draft proposals to the taskforce to consider later this week.
  • By bringing people onto the taskforce with the skills and experiences of people like Sally Russell we can move further and faster in this area.
  • Two weeks ago the Prime Minister signalled that we were moving public services to the next stage of reform. He said that we were not only going to, further enhance choice but also empower both the users of services and all the professionals who deliver them - to drive up standards for all.
  • Transformational government is about wrapping services around the citizen, not citizens around the services.
  • Last month DirectGov had over 7 million visitors. Peter is seeing the aggregate desires of millions of UK public service using citizens. I had half an hour with him a fortnight ago and came away with a dozen ideas as to how we can improve our public services.
  • I’m the Member of Parliament for West Bromwich East and I didn’t know about an important recycling initiative going on in my own patch. This information now means that a bag load of clothing for a small child and a habitat sofa are about given a second chance to give pleasure.
  • And much of that information has the potential to be reused in data mashups. Some of it already is, like Hansard on theyworkforyou, or Google Maps using Ordnance Survey data.
  • The Power of Information Report recognised that, and made recommendations to the Treasury. The Treasury, with the Department for Business, Enterprise and Regulatory Reform, published an independent economic study in the Budget and announced its intention to look at these issues during this spending review cycle.
  • It was this early open source approach that arguably fostered 500 years of Islamic scholarship in important fields like medicine, astronomy, lexicography, literature and science. In contrast, European data was stored in monasteries and did not foster easy knowledge transfer. As Gibbon wrote in the ‘Decline and fall of the Roman empire’ the ‘age of Arabian learning continued about five hundred years’ and was coeval with the darkest and most slothful period of European annals?
  • I believe in the power of mass collaboration. I believe that as James Surowiecki says the many are smarter than the few. I believe that the old hierarchies in which government policy is made are going to change for ever. I said that I don’t believe the post-bureaucratic age argument. It’s just old thinking, laissez faire ideas with a new badge. The future of government is to provide tools for empowerment, not to sit back and hope that laissez-faire adhocracy will suffice.
  • The irony that laying claim to the ownership of a policy on open source was lost to the poor researcher who had spent a day dissecting the speech. He’d been able to do so easily because it was freely available on my blog, a simple tool used for communicating information quickly and at nearly zero cost without the requirement to charge for access. The point is, who cares? It doesn’t matter who has the ideas. It’s what you do with them and how you improve on them that counts.
1More

A Ballot Buddy System - changing Presidential Elections - 0 views

  • But here’s a bipartisan solution: an electoral vote buddy system. Red and blue states of similar size should pair up and pass state laws to apportion their electoral votes by district.It would seem counterintuitive for a Democratic legislature in New York to cede a portion of its sure 31 Democratic electoral votes, but not if it opens up some of Texas’ 34 votes for the party. Washington State could make its 11 electoral votes relevant, in tandem with Tennessee, which also has 11. In this past election, voters in Louisiana (nine electoral votes) and Mississippi (six) could have focused the candidates’ views on Hurricane Katrina rebuilding had they buddied with New Jersey, which has 15 electoral votes.
3More

Use of DNA evidence is not an open and shut case, professor says - 0 views

  • In his new book, "The Double Helix and the Law of Evidence" (Harvard University Press), Kaye focuses on the intersection of science and law, and emphasizes that DNA evidence is merely information. "There's a popular perception that with DNA, you get results," Kaye said. "You're either guilty or innocent, and the DNA speaks the truth. That goes too far. DNA is a tool. Perhaps in many cases it's open and shut, in other cases it's not. There's ambiguity."
  • One of the book's key themes is that using science in court is hard to do right. "It requires lawyers and judges to understand a lot about the science," Kaye noted. "They don't have to be scientists or technicians, but they do have to know enough to understand what's going on and whether the statements that experts are making are well-founded. The lawyers need to be able to translate that information into a form that a judge or a jury can understand." Kaye also believes that lawyers need to better understand statistics and probability, an area that has traditionally been neglected in law school curricula. His book attempts to close this gap in understanding with several sections on genetic science and probability. The book also contends that scientists, too, have contributed to the false sense of certainty, when they are so often led by either side of one particular case to take an extreme position. Scientists need to approach their role as experts less as partisans and more as defenders of truth. Aiming to be a definitive history of the use of DNA evidence, "The Double Helix and the Law of Evidence" chronicles precedent-setting criminal trials, battles among factions of the scientific community and a multitude of issues with the use of probability and statistics related to DNA. From the Simpson trial to the search for the last Russian Tsar, Kaye tells the story of how DNA science has impacted society. He delves into the history of the application of DNA science and probability within the legal system and depicts its advances and setbacks.
  •  
    Whether used to clinch a guilty verdict or predict the end of a "CSI" episode, DNA evidence has given millions of people a sense of certainty -- but the outcomes of using DNA evidence have often been far from certain, according to David Kaye, Distinguished Professor of Law at Penn State.
6More

Leaked intelligence documents: Here's what Facebook and Comcast will tell the police ab... - 0 views

  • The "Facebook Subpoena/Search Warrant Guidelines" from the Cryptome site are dated 2008, so there's a chance they've been superseded. The document spells out how law enforcement and intelligence agenices should go about requesting information about Facebook users, and details what information is turned over. Following is what Facebook will turn over about you, taken verbatim from the guide: Types of Information Available User Neoprint The Neoprint is an expanded view of a given user profile. A request should specify that they are requesting a “Neoprint of used Id XXXXXX”. User Photoprint The Photoprint is a compilation of all photos uploaded by the user that have not been deleted, along with all photos uploaded by any user which have the requested user tagged in them. A request should specify that they are requesting a “Photoprint of user Id XXXXXX”. User Contact Info All user contact information input by the user and not subsequently deleted by the user is available, regardless of whether it is visible in their profile. This information may include the following: Name Birth date Contact e-mail address(s) Physical address City State Zip Phone Cell Work phone Screen name (usually for AOL Messenger/iChat) Website With the exception of contact e-mail and activated mobile numbers, Facebook validates none of this information. A request should specify that they are requesting "Contact information of user specified by [some other piece of contact information]". No historical data is retained. Group Contact Info Where a group is known, we will provide a list of users currently registered in a group. We will also provide a PDF of the current status of the group profile page. A request should specify that they are requesting "Contact information for group XXXXXX". No historical data is retained. IP Logs IP logs can be produced for a given user ID or IP address. A request should specify that they are requesting the "IP log of user Id XXXXXX" or "IP log of IP address xxx.xxx.xxx.xxx". The log contains the following information: * Script – script executed. For instance, a profile view of the URL http://www.facebook.com/profile.php?id=29445421 would populate script with "profile.php" * Scriptget – additional information passed to the script. In the above example, scriptget would contain "id=29445421" * Userid – The Facebook user id of the account active for the request * View time – date of execution in Pacific Time * IP – source IP address IP log data is generally retained for 90 days from present date. However, this data source is under active and major redevelopment and data may be retained for a longer or shorter period. Special Requests The Facebook Security Team may be able to retrieve specific information not addressed in the general categories above. Please contact Facebook if you have a specific investigative need prior to issuing a subpoena or warrant.
  • Comcast The Comcast document is labeled "Comcast Cable Law Enforcement Handbook," and is dated 2007, so there's a possibility that it, too, has been superseded. As with the other documents, it explains how law enforcement agenices can get information, and details what information is available. There's a great deal of detail in the 35-page document, which describes what Internet, phone, and television information will be turned over. For example, here's the IP information it will make available: Comcast currently maintains Internet Protocol address log files for a period of 180 days. If Comcast is asked to respond for information relating to an incident that occurred beyond this period, we will not have responsive information and can not fulfill a legal request. (Comcast can process and respond to preservation requests as outlined below in this Handbook.) As expected, Comcast will also turn over the emails, including attachments, of those who use Comcast's email service, but "In cases involving another entity’s email service or account, Comcast would not have any access to or ability to access customer email in response to a legal request." Information Comcast turns over to law enforcement agencies varies according to the request. For example, a grand jury subpoena will yield more information than a judicial summons, as you can see in the excerpt below. Comcast notes, though, that this is just a sample, and that "Each request is evaluated and reviewed on a case by case basis in light of any special procedural or legal requirements and applicable laws." So the examples "are for illustration only."
  • For those who worry about privacy, though, all of this information is small potatoes. The real worry is about the use of what are called pen registers or trap-and-trace devices, which essentially capture all of your Internet activity --- the Web sites you visits, the emails you send and receive, IM traffic, downloads, and so on. Here's what the document says about them: Pen Register / Trap and Trace Device Title 18 U.S.C. § 3123 provides a mechanism for authorizing and approving the installation and use of a pen register or a trap and trace device pursuant to court order. All orders must be coordinated prior to submission to Comcast. Law enforcement will be asked to agree to reimburse Comcast's reasonable costs incurred to purchase and/or install and monitor necessary equipment. See "Reimbursement," below.
  • ...2 more annotations...
  • As for your voice calls made via Comcast, here's what the company will turn over: Call Detail Records - Comcast maintains two years of historical call detail records (records of local and long distance connections) for our Comcast Digital Voice telephone service. This includes local, local toll, and long distance records. Comcast also currently provides traditional circuit-switched telephone service branded Comcast Digital Phone. Call detail records for this service are collected by AT&T and are available for approximately two years as well. To determine which type of service is involved, contact the Legal Demands Center—Voice and Video at 800-871-6298. Account Records - Account records are generally stored for approximately two years after the termination of an account. If the account has an outstanding balance due, records may be retained for a longer period of time. As with Internet information, what phone information will be turned over depends on the specific kind of legal request, and the examples "are for information only." Here's an excerpt:
  • And, as you would expect, there is the same pen register/trap-and-trace device language as in the section about the Internet. Oddly enough, it appears that when it comes to information about your television viewing habits, you have more privacy rights than you do when it comes to information about your Internet and voice use, because it can only be turned over in response to a court order, not a subpoena. Here's what the document has to say about TV information: Subscriber Account Identification and Related Records For subscribers to our cable television service, the Cable Act requires Comcast as a cable operator to disclose personally identifiable information to a governmental entity solely in response to a court order (and not, for example, a subpoena) or with the subscriber's express written consent. The Cable Act requires that the cable subscriber be afforded the opportunity to appear and contest in a court proceeding relevant to the court order any claims made in support of the court order. At the proceeding, the Cable Act requires the governmental entity to offer clear and convincing evidence that the subject of the information is reasonably suspected of engaging in criminal activity and that the information sought would be material evidence in the case. See 47 U.S.C. § 551(h). Why does the law give you more privacy protection over your television viewing habits than your Internet or phone use? I haven't a clue --- ask your congressman.
  •  
    Wonder what information Facebook and Comcast will turn over to police and intelligence agencies about you? Cryptome, the site that last week posted the leaked Microsoft "spy" manual, has posted company documents that purport to describe what those companies will reveal about you. As with the Microsoft document, the information is eye-opening.
2More

Harry Shearer: Attention, Dick Cheney: Don't the Germans Know We're At War? - 0 views

  • In Cheneyworld, that would be an act of war. So why aren't the Cheneys attacking the German government for its "mindset" problem? Because they have no political interest in weakening that administration, and they do in attacking the American administration. Or they're more scared of Angela Merkel than they are of Barack Obama. Unlike the US, Germany has had a recent successful experience in rolling up a terrorist threat against the country, when the Baader-Meinhof Gang was dealt with as... a criminal conspiracy. If this were a country where other countries' successes at least suggested something to be emulated, that record might be persuasive. But despite our self-image as a nation obsessed with success, some of us, at least, seem more obsessed with making a political point than with pursuing a successful course in dealing with terrorism.
  •  
    While the Cheneys, father and daughter, continue to hammer away at the accusation that the Obama administration has a "mindset" problem because it (sometimes) chooses to deal with terrorists through the criminal justice system, another bullet-hole has been leveled at their argument by, of all nations, Germany. This isn't France that chose to try terrorist suspects in a civilian criminal court. This is big bad Germany. And these were not just any terrorists. The judge in the case declared, they had dreamed of "mounting a second September 11 2001" by killing US civilians and soldiers by bombing targets like Ramstein Air Base. They were accused of operating as a German cell of the radical al-Qaeda-linked group, the Islamic Jihad Union.
3More

Unintended Consequences: Twelve Years under the DMCA | Electronic Frontier Foundation - 0 views

  • The DMCA Chills Free Expression and Scientific Research. Experience with section 1201 demonstrates that it is being used to stifle free speech and scientific research. The lawsuit against 2600 magazine, threats against Princeton Professor Edward Felten's team of researchers, and prosecution of Russian programmer Dmitry Sklyarov have chilled the legitimate activities of journalists, publishers, scientists, students, programmers, and members of the public. The DMCA Jeopardizes Fair Use. By banning all acts of circumvention, and all technologies and tools that can be used for circumvention, the DMCA grants to copyright owners the power to unilaterally eliminate the public's fair use rights. Already, the movie industry's use of encryption on DVDs has curtailed consumers' ability to make legitimate, personal-use copies of movies they have purchased. The DMCA Impedes Competition and Innovation. Rather than focusing on pirates, some have wielded the DMCA to hinder legitimate competitors. For example, the DMCA has been used to block aftermarket competition in laser printer toner cartridges, garage door openers, and computer maintenance services. Similarly, Apple has used the DMCA to tie its iPhone and iPod devices to Apple's own software and services. The DMCA Interferes with Computer Intrusion Laws. Further, the DMCA has been misused as a general-purpose prohibition on computer network access, a task for which it was not designed and to which it is ill-suited. For example, a disgruntled employer used the DMCA against a former contractor for simply connecting to the company's computer system through a virtual private network ("VPN").
  •  
    Since they were enacted in 1998, the "anti-circumvention" provisions of the Digital Millennium Copyright Act ("DMCA"), codified in section 1201 of the Copyright Act, have not been used as Congress envisioned. Congress meant to stop copyright infringers from defeating anti-piracy protections added to copyrighted works and to ban the "black box" devices intended for that purpose.1 In practice, the anti-circumvention provisions have been used to stifle a wide array of legitimate activities, rather than to stop copyright infringement. As a result, the DMCA has developed into a serious threat to several important public policy priorities:
3More

Gripe site prevails in domain cybersquatting case - 0 views

  • In his decision, Judge Robert Cleland said that CAN's case "must fail" because the company did not provide evidence that White had intended to profit from the domains. He did acknowledge, however, that White made some attempt to damage CAN's business by climbing the search rankings, but that it was only to warn other potential customers—an action that is protected under the First Amendment. Because White's websites didn't represent themselves as the real company websites for CAN and they provided accurate contact information, they were clearly gripe sites and did not infringe on CAN's marks. As noted by TechLaw, the ruling included some extra details about what is required (or in this case, not required) to qualify as a "gripe site." careeragentsnetworks.biz did not include a disclaimer stating that it is not affiliated with CAN, for example—something that many gripe sites do for the explicit purpose of avoiding lawsuits like this—but that didn't make a difference in the ruling. The decision has been applauded as a victory for the First Amendment, but is a frustrating one for trademark holders. Companies have been notoriously unhappy with the existence of gripe sites, though not everyone gives into legal threats. In 2007, we covered a case involving an Ars reader who was fighting a legal battle against Lowe's over his site, lowes-sucks.com, and in 2009, Goldman Sachs made headlines for trying to bully the creator of Goldmansachs666.com into shutting the site down. When we spoke with EFF staff attorney Corynne McSherry in 2007, she told us that the courts have been clear that "gripe sites like this are protected—in fact, they want people to speak freely and share information about their experiences with various companies." As long as they don't represent themselves as the real company, it seems the courts are still on the side of dissatisfied consumers.
  •  
    A gripe site that incorporates a company's entire trademark into its domain is still protected under the First Amendment, a US District Judge has ruled. In the case of Career Agents Network v. careeragentsnetwork.biz, the judge said that the gripe site made no effort to bolster its own business and was noncommercial, therefore protecting it from Career Agents Network's trademark claims and cybersquatting accusations.
2More

For better trade, give peace a chance - 0 views

  • Trade's effect on military conflict is one of the most important issues in international relations. The last decade has seen research and debate into the role of trade intensify; Liberals argue that trade brings peace, neo-realists and neo-Marxists reason that trade brings conflict, and classical realists contend that trade has no impact. This debate is not just academic: some key U.S. policymakers (Senator McCain and former President Clinton for instance) believe that trade brings peace, a view that contributes to their support for free trade. Economists developed bilateral trade models in isolation from models of interstate conflict, which were the work of political scientists. These two types of models handle distance between nations differently. Bilateral trade takes its cue from Isaac Newton's formula for the gravitational attraction between two objects: the larger the objects' masses and the shorter the distance between them, the larger the attraction. So the larger the trade partners' economies and the closer they are to one another, the greater their trade. However, conflict models instead incorporate shared borders by land or close distance over water (contiguity) - stressing the role of border disputes in sparking interstate conflict. Distance is included in conflict equations based on the idea that an army gets weaker the farther it strays from its base, but what point in a nation to pick for the trade and conflict equation is unclear. Often theorists use the distance between capital cities, which is problematic: wars generally happen around borders where armies are often based, and capitals have historically changed without this altering the likelihood of war between the nation and its neighbours. The authors suggest that the trade data set plugged into trade and conflict equations is critical. This type of data often contains gaps - there are a number of reasons why data from a particular nation might be unavailable, inevitably leaving researchers to make assumptions. The majority of trade and conflict studies define conflict to include all types of militarised interstate disputes (MIDs). But Keshk, Reuveny, and Pollins question the results generated when different conflict definitions are chosen. For instance, a conflict such as a threat to use nuclear weapons would not cause fatalities, but may still have some impact on trade and vice versa. In fact, by altering the data treatment and assumptions in the equation, the authors generated a variety of results, which supported several different theoretical viewpoints. The authors suggest that future research should investigate questions of missing bilateral trade data, and attempt a more subtle use of the meaning of "military conflict". Researchers might also develop distance and contiguity measures at a more sophisticated level. "Any signal that trade brings peace remains weak and inconsistent, regardless of the way proximity is modelled in the conflict equation. The signal that conflict reduces trade, in contrast, is strong and consistent," say the authors. "Any study of the effect of trade on conflict that ignores the reverse fact is practically guaranteed to produce estimates that contain simultaneity bias." Studies of the relationship between international trade and military conflict can be traced back many centuries, particularly in the works of luminaries such as de Montesquieu, Immanuel Kant, John Hobson, Vladimir Lenin, Henry Morgenthau, Kenneth Waltz, Frederic List, and Albert Hirschman. This latest study emphasises that international politics are affecting trade between nation pairs, while it is far less obvious whether trade systematically affects politics. "To our colleagues from the liberal camp we would like to say that we still believe there are limited circumstances in which more trade may help lead countries to more peaceful resolutions of their differences, particularly if they are already at peace," the authors state. "However, it is past time for academics and policymakers to look beyond the naive claim that the cultivation of trade ties will always and everywhere produce a more peaceful world."
  •  
    Liberal theorists and politicians have long argued that trade leads to peaceful relations between nations - a view that informs the push for free trade. However, many international relations experts dispute this claim. New US research out today, in the journal Conflict Management and Peace Science published by SAGE, finds that rather than trade being the driver, peace is actually the vital ingredient that allows trade to flourish.

One Step Closer to My Dream - 2 views

started by Sarah Usher on 25 May 11 no follow-up yet

Why I Like IgniteAV - 2 views

started by Kelly Bounce on 31 May 11 no follow-up yet

Safe and Legal Pot - 4 views

started by High Syn on 13 Jun 11 no follow-up yet

Amazing House and Land Packages in Perth for First-time Buyers - 1 views

started by Leigh Ann Smith on 14 Sep 11 no follow-up yet

My Brother Passed the Fireman Recruitment Process - 1 views

started by James Smith on 11 Oct 11 no follow-up yet

I Passed the UK Police Recruitment for 2011 - 1 views

started by Anne White on 11 Oct 11 no follow-up yet
« First ‹ Previous 261 - 280 of 292 Next ›
Showing 20 items per page