Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged economic mobility

Rss Feed Group items tagged

Paul Merrell

Spies and internet giants are in the same business: surveillance. But we can stop them ... - 0 views

  • On Tuesday, the European court of justice, Europe’s supreme court, lobbed a grenade into the cosy, quasi-monopolistic world of the giant American internet companies. It did so by declaring invalid a decision made by the European commission in 2000 that US companies complying with its “safe harbour privacy principles” would be allowed to transfer personal data from the EU to the US. This judgment may not strike you as a big deal. You may also think that it has nothing to do with you. Wrong on both counts, but to see why, some background might be useful. The key thing to understand is that European and American views about the protection of personal data are radically different. We Europeans are very hot on it, whereas our American friends are – how shall I put it? – more relaxed.
  • Given that personal data constitutes the fuel on which internet companies such as Google and Facebook run, this meant that their exponential growth in the US market was greatly facilitated by that country’s tolerant data-protection laws. Once these companies embarked on global expansion, however, things got stickier. It was clear that the exploitation of personal data that is the core business of these outfits would be more difficult in Europe, especially given that their cloud-computing architectures involved constantly shuttling their users’ data between server farms in different parts of the world. Since Europe is a big market and millions of its citizens wished to use Facebook et al, the European commission obligingly came up with the “safe harbour” idea, which allowed companies complying with its seven principles to process the personal data of European citizens. The circle having been thus neatly squared, Facebook and friends continued merrily on their progress towards world domination. But then in the summer of 2013, Edward Snowden broke cover and revealed what really goes on in the mysterious world of cloud computing. At which point, an Austrian Facebook user, one Maximilian Schrems, realising that some or all of the data he had entrusted to Facebook was being transferred from its Irish subsidiary to servers in the United States, lodged a complaint with the Irish data protection commissioner. Schrems argued that, in the light of the Snowden revelations, the law and practice of the United States did not offer sufficient protection against surveillance of the data transferred to that country by the government.
  • The Irish data commissioner rejected the complaint on the grounds that the European commission’s safe harbour decision meant that the US ensured an adequate level of protection of Schrems’s personal data. Schrems disagreed, the case went to the Irish high court and thence to the European court of justice. On Tuesday, the court decided that the safe harbour agreement was invalid. At which point the balloon went up. “This is,” writes Professor Lorna Woods, an expert on these matters, “a judgment with very far-reaching implications, not just for governments but for companies the business model of which is based on data flows. It reiterates the significance of data protection as a human right and underlines that protection must be at a high level.”
  • ...2 more annotations...
  • This is classic lawyerly understatement. My hunch is that if you were to visit the legal departments of many internet companies today you would find people changing their underpants at regular intervals. For the big names of the search and social media worlds this is a nightmare scenario. For those of us who take a more detached view of their activities, however, it is an encouraging development. For one thing, it provides yet another confirmation of the sterling service that Snowden has rendered to civil society. His revelations have prompted a wide-ranging reassessment of where our dependence on networking technology has taken us and stimulated some long-overdue thinking about how we might reassert some measure of democratic control over that technology. Snowden has forced us into having conversations that we needed to have. Although his revelations are primarily about government surveillance, they also indirectly highlight the symbiotic relationship between the US National Security Agency and Britain’s GCHQ on the one hand and the giant internet companies on the other. For, in the end, both the intelligence agencies and the tech companies are in the same business, namely surveillance.
  • And both groups, oddly enough, provide the same kind of justification for what they do: that their surveillance is both necessary (for national security in the case of governments, for economic viability in the case of the companies) and conducted within the law. We need to test both justifications and the great thing about the European court of justice judgment is that it starts us off on that conversation.
Paul Merrell

Harder for Americans to Rise From Lower Rungs - NYTimes.com - 0 views

  • Benjamin Franklin did it. Henry Ford did it. And American life is built on the faith that others can do it, too: rise from humble origins to economic heights. “Movin’ on up,” George Jefferson-style, is not only a sitcom song but a civil religion.
  • But many researchers have reached a conclusion that turns conventional wisdom on its head: Americans enjoy less economic mobility than their peers in Canada and much of Western Europe. The mobility gap has been widely discussed in academic circles, but a sour season of mass unemployment and street protests has moved the discussion toward center stage. Former Senator Rick Santorum of Pennsylvania, a Republican candidate for president, warned this fall that movement “up into the middle income is actually greater, the mobility in Europe, than it is in America.” National Review, a conservative thought leader, wrote that “most Western European and English-speaking nations have higher rates of mobility.” Even Representative Paul D. Ryan, a Wisconsin Republican who argues that overall mobility remains high, recently wrote that “mobility from the very bottom up” is “where the United States lags behind.”
  • Liberal commentators have long emphasized class, but the attention on the right is largely new.
  • ...2 more annotations...
  • At least five large studies in recent years have found the United States to be less mobile than comparable nations. A project led by Markus Jantti, an economist at a Swedish university, found that 42 percent of American men raised in the bottom fifth of incomes stay there as adults. That shows a level of persistent disadvantage much higher than in Denmark (25 percent) and Britain (30 percent) — a country famous for its class constraints. Meanwhile, just 8 percent of American men at the bottom rose to the top fifth. That compares with 12 percent of the British and 14 percent of the Danes.
  • Despite frequent references to the United States as a classless society, about 62 percent of Americans (male and female) raised in the top fifth of incomes stay in the top two-fifths, according to research by the Economic Mobility Project of the Pew Charitable Trusts. Similarly, 65 percent born in the bottom fifth stay in the bottom two-fifths. By emphasizing the influence of family background, the studies not only challenge American identity but speak to the debate about inequality. While liberals often complain that the United States has unusually large income gaps, many conservatives have argued that the system is fair because mobility is especially high, too: everyone can climb the ladder. Now the evidence suggests that America is not only less equal, but also less mobile.
Gary Edwards

How World War I Paved the Way for the Warfare State :: The Mises Economics Blog: The Ci... - 0 views

  •  
    Part ONE "by David Stockman Remarks To The Committee For The Republic, Washington DC, February 2014 (Part 1 of 6 Parts) [From David Stockman's Contra Corner.] Flask in hand, Boris Yelstin famously mounted a tank outside the Soviet Parliament in August 1991. Presently, the fearsome Red Army stood down-an outcome which 45 years of Cold War military mobilization by the West had failed to accomplish. At the time, the U.S. Warfare State's budget- counting the pentagon, spy agencies, DOE weapons, foreign aid, homeland security and veterans--was about $500 billion in today's dollars.  Now, a quarter century on from the Cold War's end, that same metric stands at $900 billion. This near doubling of the Warfare State's fiscal girth is a tad incongruous.  After all, America's war machine was designed to thwart a giant, nuclear-armed industrial state, but, alas, we now have no industrial state enemies left on the planet. The much-shrunken Russian successor to the Soviet Union, for example, has become a kleptocracy run by a clever thief who prefers stealing from his own citizens. Likewise, the Red Chinese threat consists of a re-conditioned aircraft carrier bought second-hand from a former naval power--otherwise known as the former Ukraine. China's bubble-ridden domestic economy would collapse within six weeks were it to actually bomb the 4,000 Wal-Mart outlets in America on which its mercantilist export machine utterly depends. On top of that, we've been fired as the world's policeman, al Qaeda has splintered among warlords who inhabit the armpits of the world from Yemen to Somalia and during last September's Syria war scare the American people even took away the President's keys to the Tomahawk missile batteries.  In short, the persistence of America's trillion dollar Warfare State budget needs some serious "splainin". The Great War and Its Aftermath My purpose tonight is to sketch the long story of how it all happened, starti
Paul Merrell

Economic Recovery Is Mostly A Myth For The 99 Percent - 0 views

  • So, the rich have genuinely and thoroughly recovered from the crash of 2008. But what about everyone else? * 93 percent of U.S. counties haven’t recovered from the Great Recession according to the National Association of Counties. * According to Pew, the middle class is now no longer the majority in America. * The “recovery gap” has more than 50 million Americans living in economically distressed regions plagued by high levels of unemployment, poverty and fiscal anxiety. * Nearly 95 percent of all new jobs under President Barack Obama were part-time, or contract, which pay less and are precarious. * Due to unprecedented and often illegal home foreclosures by banks, the wealth gap between whites and blacks grew during the era of Obama. * 63 percent of Americans do not have enough savings to cover an unforeseen $500 bill. The only serious counterargument to this narrative is to note many of these trends preceded the Great Recession. That is sadly true. Workers have seen stagnant wages for decades and a decreasing share of income and wealth. As the Institute for Policy Studies notes, between 1983 and 2009, over 40 percent of all wealth gains flowed to the 1 percent and 82 percent of wealth gains went to the top 5 percent. President Obama said in 2013 that economic inequality was “the defining issue of our time.” If so, Obama largely failed to do anything meaningful to address this issue.
Gary Edwards

About Americans for Prosperity | Americans for Prosperity - 0 views

  •  
    AFP is an excellent branch of the American Tea Party Movement.  The Grassroots tools are very good, and the group leadership effective, trustworthy and patriotic.  "The Great One", Mark Levin is a founder of AFP and remains very involved with the day to day operation.  Although i'm a contributing member, one of the things i most appreciate about AFP is that when they launch a contact/letter surge, unlike many other "grassroots" operations, there is no charge for the contact.  AFP is an easy and affordable way to contact those who took an oath to represent us and defend our Constitution.  Good group! excerpt: Americans for Prosperity™ (AFP) and Americans for Prosperity Foundation (AFP Foundation) are committed to educating citizens about economic policy and mobilizing those citizens as advocates in the public policy process. AFP is an organization of grassroots leaders who engage citizens in the name of limited government and free markets on the local, state, and federal levels. The grassroots activists of AFP advocate for public policies that champion the principles of entrepreneurship and fiscal and regulatory restraint. AFP Foundation is committed to educating citizens about economic policy and a return of the federal government to its Constitutional limits. AFP Foundation's educational programs and analyses help policymakers, the media, and individual citizens understand why policies that promote the American enterprise system are the best way to ensure prosperity for all Americans. To that end, AFP and AFP Foundation support: Cutting taxes and government spending in order to halt the encroachment of government in the economic lives of citizens by fighting proposed tax increases and pointing out evidence of waste, fraud, and abuse. Tax and Expenditure Limitations to promote fiscal responsibility. Removing unnecessary barriers to entrepreneurship and opportunity by sparking citizen involvement in the regulatory process early on in order to reduce red tap
Paul Merrell

EU issues guidelines on labelling products from Israeli settlements | World news | The ... - 0 views

  • The European Union has issued new guidelines for the labelling of products from illegal Israeli settlements in the occupied Palestinian territories, after years of deliberation and in the teeth of fierce Israeli opposition. Binyamin Netanyahu, the Israeli prime minister, made a personal appeal to a number of key European figures in the runup to the decision, in which he said the plan was discriminatory, indicative of double standards, and would embolden those who seek to “eliminate” Israel. The measures will primarily cover fruit and vegetables and should affect less than 1% of all trade from Israel to the EU, which is worth about €30bn. EU officials said existing measures for produce brought into Britain have had no negative economic effect.
  • On some products, like fruit and vegetables, the labelling referring to settlements will be mandatory, while on others it will be voluntary. Israel sees the move as a political stigma that rewards Palestinian violence and will push consumers away. It immediately summoned the EU ambassador to Israel, Lars Faaborg-Andersen, in protest. The Israeli foreign ministry said the EU has chosen “for political motives, to take an unusual and discriminatory step” at a time when Israel is facing a wave of terror. In a statement, the ministry said it was “surprised and even angered by the fact that the EU chooses to implement a double standard against Israel, while ignoring 200 territorial disputes taking place today around the world, including within [the EU] or right on [Israel’s] doorstep”. The EU’s claim that the decision was a “technical step” was baseless and cynical, the statement added.
  • Despite insisting in public that the new guidelines provide clarity to consumers, European diplomats have privately made it clear the move is designed to put pressure on Israel over its continued settlement building in the occupied territories and the absence of a peace dialogue; a sharp rise in violence between Israelis and Palestinians has claimed 90 lives in the last month. Announcing the new guidelines, a European commission official said it had “adopted this morning the Interpretative Notice on indication of origin of goods from the territories occupied by Israel since June 1967”. Although the new guidelines are expected to have little real economic impact, they do carry a political significance for Israel, not least because of the widespread agreement among European governments over their implementation. The decision to push ahead with issuing the guidelines also marks the second major defeat in a year for Netanyahu on an international stage, following his defeat over the Iran nuclear accord, amid mounting evidence of Israel’s growing international isolation.
  • ...2 more annotations...
  • Senior European officials insist that European consumers are entitled to know the source of goods previously labelled as Israeli. Israeli politicians – including Netanyahu – have made comparisons between labelling and the Nazi era, with some suggesting the move is immoral and antisemitic.
  • On Tuesday, a letter leaked to the Guardian showed that Netanyahu had written or spoken to a number of senior European figures, including European parliament president Martin Schulz, asking for their help to block the move. In a letter to Schulz, the Israeli prime minister said the move was politicised, adding that it could “lead to an actual boycott [of Israel], emboldening those who are not interested in Israeli-Palestinian peace but eliminating Israel altogether”. Since 2003, the EU has placed a numerical code on Israeli imports to allow customs to distinguish between products made within the Green Line and those that are produced beyond it. The UK adopted labelling guidelines for settlement products three years ago.
  •  
    Too mild. Under international law, the EU should do a total ban on importing all products from the Occupied Territories. 
Paul Merrell

Virtual Economy's Phantom Job Gains Are Based on Statistical Fraud. And More Fraud Is i... - 0 views

  • Washington can’t stop lying.  Don’t be convinced by last Thursday’s job report that it is your fault if you don’t have a job. Those 288,000 jobs and 6.1% unemployment rate are more fiction than reality.  In his analysis of the June Labor Data from the Bureau of Labor Statistics, John Williams (www.ShadowStats.com) wrote that the 288,000 June jobs and 6.1% unemployment rate  are “far removed from common experience and underlying reality.” Payrolls were overstated by “massive, hidden shifts in seasonal adjustments,” and the Birth-Death model added the usual phantom jobs.  Williams reports that “the seasonal factors are changed each and every month as part of the concurrent seasonal-adjustment process, which is tantamount to a fraud,” as the changes in the seasonal factors can inflate the jobs number.  While the headline numbers always are on a new basis, the prior reporting is not revised so as to be consistent.
  • The monthly unemployment rates are not comparable, so one doesn’t know whether the official U.3 rate (the headline rate that the financial press reports) went up or down. Moreover, the rate does not count discouraged workers who, unable to find a job, cease looking. To be counted among the U.3 unemployed, the person must have actively looked for work during the four weeks prior to the survey. The U.3 rate automatically declines as people who have been unable to find jobs cease trying to find one and thereby cease to be counted as unemployed. There is a second official measure of unemployment that includes people who have been discouraged for less than one year. That rate, known as U.6, is seldom reported and is double the 6.1% rate. Since 1994 there has been no official measure than includes discouraged people who have not looked for a job for more than a year. Including all discouraged workers produces an unemployment rate that currently stands at 23.1%, almost four times the rate that the financial press reports.
  • What you can take away from this is the opposite of what the presstitute media would have you believe.  The measured rate of unemployment can decline simply because large numbers of the unemployed become discouraged workers, cease looking for work, and cease to be counted in the U.3 and U.6 measures of the unemployment rate.   The decline in the employment-population ratio from 63% prior to the 2008 downturn to 59% today reflects the growth in discouraged workers.  Indeed, the ratio has not recovered its previous level during the alleged recovery, an indication that the recovery is an illusion created by the understated measure of inflation that is used to deflate nominal GDP growth.
  • ...8 more annotations...
  • Insurance (most likely the paperwork of Obamacare) contributed 8,500 jobs. As so few can purchase homes, “real estate rental and leasing” contributed 8,500 jobs. Professional and business services contributed 67,000 jobs, but 57% of these jobs were in employment services, temporary help services, and services to buildings and dwellings.   That old standby, education and health services, accounted for 33,700 jobs consisting mainly of ambulatory health care services jobs and social assistance jobs of which three-quarters are in child day care services.   The other old standby, waitresses and bartenders, gave us 32,800 jobs, and amusements, gambling, and recreation gave us 3,500 jobs.
  • In other words, the economy did not gain 288,000 new jobs last month.   But let’s assume the economy did gain 288,000 jobs and exam where the claimed jobs are reported to be. Of the alleged 288,000 new jobs, 16,000, or 5.5 percent are in manufacturing, which is not very promising for engineers and blue collar workers.  Growth in goods producing jobs has almost disappeared from the US economy.  As explained below, to alter this problem the government is going to change definitions in order to artificially inflate manufacturing jobs. In June private services account for 82 percent of the supposed new jobs.  The jobs are found mainly in non-tradable domestic services that pay little and cannot be exported to help to close the large US trade deficit. Wholesale and retail trade account for 55,300 jobs.  Do you believe sales are this strong  when retailers are closing stores and when shopping malls are closing?
  • Another indication that there has been no recovery is that Sentier Research’s index of real median household income continued to decline for two years after the alleged recovery began in June 2009.   There has been a slight upturn in real median household income since June 2011, but income remains far below the pre-recession level.   The Birth-Death model adds an average of 62,000 jobs to the reported payroll jobs numbers each month. This arbitrary boost to the payroll jobs numbers is in addition to the Bureau of Labor Statistics’ underlying assumption that unreported jobs lost to business failures are matched by unreported new jobs from new business startups, an assumption that does not well fit an economy that fell into recession and is unable to recover.   John Williams concludes that in current BLS reporting, “the aggregate average overstatement of employment change easily exceeds 200,000 jobs per month.”
  • Local government, principally education, gave us 22,000 jobs.   So, where are the jobs for university graduates?  They are practically non-existent. Think of all the MBAs, but June had only 2,300 jobs for management of companies and enterprises. Think of the struggle to get into law and medical schools.  There’s no job payoff. June had jobs for 1,200 in legal services, which includes receptionists and para-legals.  Where are all the law school graduates finding jobs? Offices of physicians (mainly people who fill out the mandated paperwork and comply with all the regulations, which have multiplied under ObamaCare) hired 4,000 people.  Outpatient care centers hired 700 people.  Nursing care facilities hired 2,400 people.  So where are the jobs for the medical school graduates? Aside from all the exaggerations in the jobs numbers of which ShadowStats.com has informed us, just taking the jobs as reported, what kind of economy do these jobs indicate:  a superpower whose pretensions are to exercise hegemony over the world or an economy in which opportunities are disappearing and incomes are falling?
  • Do you think that this jobs picture would be the same if the government in Washington cared about you instead of the mega-rich? Some interesting numbers can be calculated from table A.9 in the BLS press release.  John Williams advises that the BLS is inconsistent in the methods it uses to tabulate the data in table A.9 and that the data is also afflicted by seasonal adjustment problems.  However, as the unemployment rate and payroll jobs are reported regardless of their problems, we can also report the BLS finding that in June 523,000 full-time jobs disappeared and 800,000 part time jobs appeared. Here, perhaps, we have yet another downside of the misnamed Obama “Affordable Care Act.”  Employers are terminating full-time employment and replacing the jobs with part-time employment in order to come in under the 50-person full time employment that makes employers responsible for fringe benefits such as health care. Americans are already experiencing difficulties making ends meet, despite the alleged “recovery.”  If yet another half million Americans have been forced onto part-time pay with consequent loss of health care and other benefits, consumer demand is further compressed, with the consequence, unless hidden by statistical trickery, of a 2nd quarter negative GDP and thus officially the reappearance of recession.
  • What will the government do if a recession cannot be hidden?  If years of unprecedented money printing and Keynesian fiscal deficits have not brought recovery, what will bring recovery?  How far down will US living standards fall for the 99% in order that the 1% can become ever more mega-rich while Washington wastes our diminishing substance exercising hegemony over the world? Just as Washington lied to you about Saddam Hussein’s weapons of mass destruction, Assad’s use of chemical weapons, Russian invasion of Ukraine, Waco, and any number of false flag or nonexistent attacks such as Tonkin Gulf, Washington lies to you about jobs and economic recovery.  Don’t believe the spin that you are unemployed because you are shiftless and prefer government handouts to work.  The government does not want you to know that you are unemployed because the corporations offshored American jobs to foreigners and because economic policy only serves the oversized banks and the one percent. Just as the jobs and inflation numbers are rigged and the financial markets are rigged, the corrupt Obama regime is now planning to rig US manufacturing and trade statistics in order to bury all evidence of offshoring’s adverse impact on our economy.
  • The federal governments Economic Classification Policy Committee has come up with a proposal to redefine fact as fantasy in order to hide offshoring’s contribution to the US trade deficit, artificially inflate the number of US manufacturing jobs, and redefine foreign-made manufactured products as US manufactured products.  For example, Apple iPhones made in China and sold in Europe would be reported as a US export of manufactured goods. Read Ben Beachy’s important report on this blatant statistical fraud in CounterPunch’s July 4th weekend edition: http://www.counterpunch.org/2014/07/04/we-didnt-offshore-manufacturing/ China will not agree that the Apple brand name means that the phones are not Chinese production. If the Obama regime succeeds with this fraud, the iPhones would be counted twice, once by China and once by the US, and the double-counting would exaggerate world GDP. For years I have exposed the absurd claim that offshoring is merely the operation of free trade, and I have exposed the incompetent studies by such as Michael Porter at Harvard and Matthew Slaughter at Dartmouth that claimed to prove that the US was benefitting from offshoring its manufacturing.  My book published in 2012 in Germany and in 2013 in the US, The Failure of Laissez Faire Capitalism and Economic Dissolution of the West, proves that offshoring has dismantled the ladders of upward mobility that made the US an opportunity society and is responsible for the decline in US economic growth. The lost jobs and decline in the middle class has contributed to the rise in income inequality, the destruction of tax base for cities and states, and loss of population in America’s once great manufacturing centers.
  • For the most part economists have turned a blind eye. Economists serve the globalists.  It pays them well. The corruption in present-day America is total. Psychologists and anthropologists serve war and torture. Economists serve globalism and US financial hegemony. Physicists and chemists serve the war industries. Physicists and computer geeks serve NSA. The media serves the government and the corporations. The political parties serve the six powerful private interest groups that rule the country. No one serves truth and liberty. I predict that within ten years truth and liberty will be forbidden words uttered only by “domestic extremists” who are a threat that must be exterminated without due process of law. America has left us.  We now have the tyranny of the Orwellian state that rules, not by the ballot box and Constitution, but by force and propaganda.
Gary Edwards

Reinventing Banking: From Russia to Iceland to Ecuador - 1 views

  • Global developments in finance and geopolitics are prompting a rethinking of the structure of banking and of the nature of money itself. Among other interesting news items: * In Russia, vulnerability to Western sanctions has led to proposals for a banking system that is not only independent of the West but is based on different design principles. * In Iceland, the booms and busts culminating in the banking crisis of 2008-09 have prompted lawmakers to consider a plan to remove the power to create money from private banks. * In Ireland, Iceland and the UK, a recession-induced shortage of local credit has prompted proposals for a system of public interest banks on the model of the Sparkassen of Germany. * In Ecuador, the central bank is responding to a shortage of US dollars (the official Ecuadorian currency) by issuing digital dollars through accounts to which everyone has access, effectively making it a bank of the people.
  • A major concern with stripping private banks of the power to create money as deposits when they make loans is that it will seriously reduce the availability of credit in an already sluggish economy. One solution is to make the banks, or some of them, public institutions. They would still be creating money when they made loans, but it would be as agents of the government; and the profits would be available for public use, on the model of the US Bank of North Dakota and the German Sparkassen (public savings banks). In Ireland, three political parties – Sinn Fein, the Green Party and Renua Ireland (a new party) — are now supporting initiatives for a network of local publicly-owned banks on the Sparkassen model. In the UK, the New Economy Foundation (NEF) is proposing that the failed Royal Bank of Scotland be transformed into a network of public interest banks on that model. And in Iceland, public banking is part of the platform of a new political party called the Dawn Party.
  • Particularly interesting is a proposal to provide targeted lending for businesses and industries by providing them with low-interest loans at 1-4 percent, financed through the central bank with quantitative easing (digital money creation). The proposal is to issue 20 trillion rubles for this purpose over a five year period. Using quantitative easing for economic development mirrors the proposal of UK Labour Leader Jeremy Corbin for “quantitative easing for people.”
  • ...8 more annotations...
  • William Engdahl concludes that Russia is in “a fascinating process of rethinking every aspect of her national economic survival because of the reality of the western attacks,” one that “could produce a very healthy transformation away from the deadly defects” of the current banking model.
  • Iceland’s Radical Money Plan Iceland, too, is looking at a radical transformation of its money system, after suffering the crushing boom/bust cycle of the private banking model that bankrupted its largest banks in 2008. According to a March 2015 article in the UK Telegraph: Iceland’s government is considering a revolutionary monetary proposal – removing the power of commercial banks to create money and handing it to the central bank. The proposal, which would be a turnaround in the history of modern finance, was part of a report written by a lawmaker from the ruling centrist Progress Party, Frosti Sigurjonsson, entitled “A better monetary system for Iceland”.
  • Under this “Sovereign Money” proposal, the country’s central bank would become the only creator of money. Banks would continue to manage accounts and payments and would serve as intermediaries between savers and lenders. The proposal is a variant of the Chicago Plan promoted by Kumhof and Benes of the IMF and the Positive Money group in the UK.
  • Ever since 2000, when Ecuador agreed to use the US dollar as its official legal tender, it has had to ship boatloads of paper dollars into the country just to conduct trade. In order to “seek efficiency in payment systems [and] to promote and contribute to the economic stability of the country,” the government of President Rafael Correa has therefore established the world’s first national digitally-issued currency.
  • Unlike Bitcoin and similar private crypto-currencies (which have been outlawed in the country), Ecuador’s dinero electronico is operated and backed by the government. The Ecuadorian digital currency is less like Bitcoin than like M-Pesa, a private mobile phone-based money transfer service started by Vodafone, which has generated a “mobile money” revolution in Kenya.
  • According to a National Assembly statement: Electronic money will stimulate the economy; it will be possible to attract more Ecuadorian citizens, especially those who do not have checking or savings accounts and credit cards alone. The electronic currency will be backed by the assets of the Central Bank of Ecuador.
  • That means there is no fear of the bank going bankrupt or of bank runs or bail-ins. Nor can the digital currency be devalued by speculative short selling. The government has declared that these are digital US dollars trading at 1 to 1 – take it or leave it – and the people are taking it. According to an October 2015 article titled “
  • Banking Moves into the 21st Century The catastrophic failures of the Western banking system mandate a new vision. These transformations, current and proposed, are constructive steps toward streamlining the banking system, eliminating the risks that have devastated individuals and governments, democratizing money, and promoting sustainable and prosperous economies.
  •  
    Excellent article on banking, lending, and currency reform initiatives.  Thanks to Marbux!
Paul Merrell

Tomgram: Alfred McCoy, It's About Blackmail, Not National Security | TomDispatch - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.  Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.  The answer is remarkably simple.  For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.  Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies. Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  • Once upon a time, such surveillance was both expensive and labor intensive. Today, however, unlike the U.S. Army’s shoe-leather surveillance during World War I or the FBI’s break-ins and phone bugs in the Cold War years, the NSA can monitor the entire world and its leaders with only 100-plus probes into the Internet’s fiber optic cables. This new technology is both omniscient and omnipresent beyond anything those lacking top-secret clearance could have imagined before the Edward Snowden revelations began.  Not only is it unimaginably pervasive, but NSA surveillance is also a particularly cost-effective strategy compared to just about any other form of global power projection. And better yet, it fulfills the greatest imperial dream of all: to be omniscient not just for a few islands, as in the Philippines a century ago, or a couple of countries, as in the Cold War era, but on a truly global scale. In a time of increasing imperial austerity and exceptional technological capability, everything about the NSA’s surveillance told Washington to just “go for it.”  This cut-rate mechanism for both projecting force and preserving U.S. global power surely looked like a no-brainer, a must-have bargain for any American president in the twenty-first century -- before new NSA documents started hitting front pages weekly, thanks to Snowden, and the whole world began returning the favor.
  • ...12 more annotations...
  • As the gap has grown between Washington’s global reach and its shrinking mailed fist, as it struggles to maintain 40% of world armaments (the 2012 figure) with only 23% of global gross economic output, the U.S. will need to find new ways to exercise its power far more economically. As the Cold War took off, a heavy-metal U.S. military -- with 500 bases worldwide circa 1950 -- was sustainable because the country controlled some 50% of the global gross product. But as its share of world output falls -- to an estimated 17% by 2016 -- and its social welfare costs climb relentlessly from 4% of gross domestic product in 2010 to a projected 18% by 2050, cost-cutting becomes imperative if Washington is to survive as anything like the planet’s “sole superpower.” Compared to the $3 trillion cost of the U.S. invasion and occupation of Iraq, the NSA’s 2012 budget of just $11 billion for worldwide surveillance and cyberwarfare looks like cost saving the Pentagon can ill-afford to forego. Yet this seeming “bargain” comes at what turns out to be an almost incalculable cost. The sheer scale of such surveillance leaves it open to countless points of penetration, whether by a handful of anti-war activists breaking into an FBI field office in Media, Pennsylvania, back in 1971 or Edward Snowden downloading NSA documents at a Hawaiian outpost in 2012.
  • In October 2001, not satisfied with the sweeping and extraordinary powers of the newly passed Patriot Act, President Bush ordered the National Security Agency to commence covert monitoring of private communications through the nation's telephone companies without the requisite FISA warrants. Somewhat later, the agency began sweeping the Internet for emails, financial data, and voice messaging on the tenuous theory that such “metadata” was “not constitutionally protected.” In effect, by penetrating the Internet for text and the parallel Public Switched Telephone Network (PSTN) for voice, the NSA had gained access to much of the world’s telecommunications. By the end of Bush’s term in 2008, Congress had enacted laws that not only retrospectively legalized these illegal programs, but also prepared the way for NSA surveillance to grow unchecked. Rather than restrain the agency, President Obama oversaw the expansion of its operations in ways remarkable for both the sheer scale of the billions of messages collected globally and for the selective monitoring of world leaders.
  • By 2012, the centralization via digitization of all voice, video, textual, and financial communications into a worldwide network of fiber optic cables allowed the NSA to monitor the globe by penetrating just 190 data hubs -- an extraordinary economy of force for both political surveillance and cyberwarfare.
  • With a few hundred cable probes and computerized decryption, the NSA can now capture the kind of gritty details of private life that J. Edgar Hoover so treasured and provide the sort of comprehensive coverage of populations once epitomized by secret police like East Germany’s Stasi. And yet, such comparisons only go so far. After all, once FBI agents had tapped thousands of phones, stenographers had typed up countless transcripts, and clerks had stored this salacious paper harvest in floor-to-ceiling filing cabinets, J. Edgar Hoover still only knew about the inner-workings of the elite in one city: Washington, D.C.  To gain the same intimate detail for an entire country, the Stasi had to employ one police informer for every six East Germans -- an unsustainable allocation of human resources. By contrast, the marriage of the NSA’s technology to the Internet’s data hubs now allows the agency’s 37,000 employees a similarly close coverage of the entire globe with just one operative for every 200,000 people on the planet
  • Through the expenditure of $250 million annually under its Sigint Enabling Project, the NSA has stealthily penetrated all encryption designed to protect privacy. “In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” reads a 2007 NSA document. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.” By collecting knowledge -- routine, intimate, or scandalous -- about foreign leaders, imperial proconsuls from ancient Rome to modern America have gained both the intelligence and aura of authority necessary for dominion over alien societies. The importance, and challenge, of controlling these local elites cannot be overstated. During its pacification of the Philippines after 1898, for instance, the U.S. colonial regime subdued contentious Filipino leaders via pervasive policing that swept up both political intelligence and personal scandal. And that, of course, was just what J. Edgar Hoover was doing in Washington during the 1950s and 1960s.
  • Indeed, the mighty British Empire, like all empires, was a global tapestry woven out of political ties to local leaders or “subordinate elites” -- from Malay sultans and Indian maharajas to Gulf sheiks and West African tribal chiefs. As historian Ronald Robinson once observed, the British Empire spread around the globe for two centuries through the collaboration of these local leaders and then unraveled, in just two decades, when that collaboration turned to “non-cooperation.” After rapid decolonization during the 1960s transformed half-a-dozen European empires into 100 new nations, their national leaders soon found themselves the subordinate elites of a spreading American global imperium. Washington suddenly needed the sort of private information that could keep such figures in line. Surveillance of foreign leaders provides world powers -- Britain then, America now -- with critical information for the exercise of global hegemony. Such spying gave special penetrating power to the imperial gaze, to that sense of superiority necessary for dominion over others.  It also provided operational information on dissidents who might need to be countered with covert action or military force; political and economic intelligence so useful for getting the jump on allies in negotiations of all sorts; and, perhaps most important of all, scurrilous information about the derelictions of leaders useful in coercing their compliance.
  • In late 2013, the New York Times reported that, when it came to spying on global elites, there were “more than 1,000 targets of American and British surveillance in recent years,” reaching down to mid-level political actors in the international arena. Revelations from Edward Snowden’s cache of leaked documents indicate that the NSA has monitored leaders in some 35 nations worldwide -- including Brazilian president Dilma Rousseff, Mexican presidents Felipe Calderón and Enrique Peña Nieto, German Chancellor Angela Merkel, and Indonesia’s president Susilo Bambang Yudhoyono.  Count in as well, among so many other operations, the monitoring of “French diplomatic interests” during the June 2010 U.N. vote on Iran sanctions and “widespread surveillance” of world leaders during the Group 20 summit meeting at Ottawa in June 2010. Apparently, only members of the historic “Five Eyes” signals-intelligence alliance (Australia, Canada, New Zealand, and Great Britain) remain exempt -- at least theoretically -- from NSA surveillance. Such secret intelligence about allies can obviously give Washington a significant diplomatic advantage. During U.N. wrangling over the U.S. invasion of Iraq in 2002-2003, for example, the NSA intercepted Secretary-General Kofi Anan’s conversations and monitored the “Middle Six” -- Third World nations on the Security Council -- offering what were, in essence, well-timed bribes to win votes. The NSA’s deputy chief for regional targets sent a memo to the agency’s Five Eyes allies asking “for insights as to how membership is reacting to on-going debate regarding Iraq, plans to vote on any related resolutions [..., and] the whole gamut of information that could give U.S. policymakers an edge in obtaining results favorable to U.S. goals.”
  • Indicating Washington’s need for incriminating information in bilateral negotiations, the State Department pressed its Bahrain embassy in 2009 for details, damaging in an Islamic society, on the crown princes, asking: “Is there any derogatory information on either prince? Does either prince drink alcohol? Does either one use drugs?” Indeed, in October 2012, an NSA official identified as “DIRNSA,” or Director General Keith Alexander, proposed the following for countering Muslim radicals: “[Their] vulnerabilities, if exposed, would likely call into question a radicalizer’s devotion to the jihadist cause, leading to the degradation or loss of his authority.” The agency suggested that such vulnerabilities could include “viewing sexually explicit material online” or “using a portion of the donations they are receiving… to defray personal expenses.” The NSA document identified one potential target as a “respected academic” whose “vulnerabilities” are “online promiscuity.”
  • Just as the Internet has centralized communications, so it has moved most commercial sex into cyberspace. With an estimated 25 million salacious sites worldwide and a combined 10.6 billion page views per month in 2013 at the five top sex sites, online pornography has become a global business; by 2006, in fact, it generated $97 billion in revenue. With countless Internet viewers visiting porn sites and almost nobody admitting it, the NSA has easy access to the embarrassing habits of targets worldwide, whether Muslim militants or European leaders. According to James Bamford, author of two authoritative books on the agency, “The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to ‘neutralize’ their targets.”
  • Indeed, whistleblower Edward Snowden has accused the NSA of actually conducting such surveillance.  In a December 2013 letter to the Brazilian people, he wrote, “They even keep track of who is having an affair or looking at pornography, in case they need to damage their target's reputation.” If Snowden is right, then one key goal of NSA surveillance of world leaders is not U.S. national security but political blackmail -- as it has been since 1898. Such digital surveillance has tremendous potential for scandal, as anyone who remembers New York Governor Eliot Spitzer’s forced resignation in 2008 after routine phone taps revealed his use of escort services; or, to take another obvious example, the ouster of France’s budget minister Jérôme Cahuzac in 2013 following wire taps that exposed his secret Swiss bank account. As always, the source of political scandal remains sex or money, both of which the NSA can track with remarkable ease.
  • By starting a swelling river of NSA documents flowing into public view, Edward Snowden has given us a glimpse of the changing architecture of U.S. global power. At the broadest level, Obama’s digital “pivot” complements his overall defense strategy, announced in 2012, of reducing conventional forces while expanding into the new, cost-effective domains of space and cyberspace. While cutting back modestly on costly armaments and the size of the military, President Obama has invested billions in the building of a new architecture for global information control. If we add the $791 billion expended to build the Department of Homeland Security bureaucracy to the $500 billion spent on an increasingly para-militarized version of global intelligence in the dozen years since 9/11, then Washington has made a $1.2 trillion investment in a new apparatus of world power.
  • So formidable is this security bureaucracy that Obama’s recent executive review recommended the regularization, not reform, of current NSA practices, allowing the agency to continue collecting American phone calls and monitoring foreign leaders into the foreseeable future. Cyberspace offers Washington an austerity-linked arena for the exercise of global power, albeit at the cost of trust by its closest allies -- a contradiction that will bedevil America’s global leadership for years to come. To update Henry Stimson: in the age of the Internet, gentlemen don't just read each other’s mail, they watch each other’s porn. Even if we think we have nothing to hide, all of us, whether world leaders or ordinary citizens, have good reason to be concerned.
Paul Merrell

U.S. urges allies to think twice before joining China-led bank - Yahoo Finance - 0 views

  • (Reuters) - The United States urged countries on Tuesday to think twice about signing up to a new China-led Asian development bank that Washington sees as a rival to the World Bank, after Germany, France and Italy followed Britain in saying they would join. The concerted move by U.S. allies to participate in Beijing's flagship economic outreach project is a diplomatic blow to the United States and its efforts to counter the fast-growing economic and diplomatic influence of China. Europe's participation reflects the eagerness to partner with China's economy, the world's second largest, and comes amid prickly trade negotiations between Brussels and Washington.
  • European Union and Asian governments are frustrated that the U.S. Congress has held up a reform of voting rights in the International Monetary Fund that would give China and other emerging powers more say in global economic governance.
  • Washington insists it has not actively discouraged countries from joining the new bank, but it has questioned whether the Asian Infrastructure Investment Bank (AIIB) will have sufficient standards of governance and environmental and social safeguards. "I hope before the final commitments are made anyone who lends their name to this organization will make sure that the governance is appropriate," Treasury Secretary Jack Lew told U.S. lawmakers. Lew warned the Republican-dominated Congress that China and other rising powers were challenging American leadership in global financial institutions, and he urged lawmakers to swiftly ratify stalled reform of the IMF.
  • ...6 more annotations...
  • In a joint statement, the foreign and finance ministers of Germany, France and Italy said they would work to ensure the new institution "follows the best standards and practices in terms of governance, safeguards, debt and procurement policies." Luxembourg’s Finance Ministry confirmed the country, a big financial centre, has also applied to be a founding member of the $50 billion AIIB.
  • A spokeswoman for the European Commission, the EU's executive arm, endorsed member states' participation in the AIIB as a way of tackling global investment needs and as an opportunity for EU companies.
  • Lew told lawmakers that the U.S. delay in ratifying the agreement was undermining its credibility and influence as countries question the United States' commitment to international institutions. “It's not an accident that emerging economies are looking at other places because they are frustrated that, frankly, the United States has stalled a very mild and reasonable set of reforms in the IMF,” Lew said.
  • Some Republicans have complained the changes would cost too much at a time Washington is running big budget deficits. The reforms have also ran afoul of a growing isolationist trend among the party's influential Tea Party wing.
  • Washington says it sees a role for the IAAB given Asia's immense infrastructure needs and regards it as a potential partner for established institutions like the ADB. But its strategy of questioning the IAAB's standards has drawn criticism from some observers, who say the administration should have been more accepting of the new bank or offered alternatives within the existing institutions. "If you try to fight the rising power's peaceful ascent you sow big problems in the future," said Fred Bergsten, a former top international affairs official at the U.S. Treasury and currently a fellow at the Peterson Institute in Washington. Scott Morris, a former U.S. Treasury official who led U.S. engagement with the multilateral development banks during the first Obama administration, said Washington was paying the price for delay on IMF reform. "It's a clear sentiment among a pretty diverse group of countries: We would like to mobilize more capital for infrastructure through MDBs (multilateral development banks)," said Morris, now with the Washington-based Center for Global Development. "And the U.S. stands in the way of that and now finds itself increasingly isolated as a result.”
  • Japan, Australia and South Korea remain notable regional absentees from the AIIB. Australian Prime Minister Tony Abbott said at the weekend he would make a final decision on membership soon. South Korea has said it is still in discussions with China and other countries about possible participation. Japan is unlikely to join the AIIB, but ADB head Takehiko Nakao told the Nikkei Asian Review that the two institutions were in discussions and could work together.
  •  
    Oh, man. Angela Merkel just hitched Germany's wagon to China's, which implictly means Russia's and the rest of BRICS too. Plus the European Commission, UK, France, Italy, and Luxembourg   Keep in mind that China will open its RMB trading centers in the major financial hubs in September and that the folks in Brussels are making noises about a European combined defense organization, independent of NATO anjd the U.S.   I want more information to be certain that there is more here than moves to create bargaining leverage with Washington, D.C.. but it might soon be time to buy a wheelbarrow to carry my walkabout spending money. Wow!
Paul Merrell

The Collapse of Europe? « LobeLog - 0 views

  • And yet, for all this success, the European project is currently teetering on the edge of failure. Growth is anemic at best and socio-economic inequality is on the rise. The countries of Eastern and Central Europe, even relatively successful Poland, have failed to bridge the income gap with the richer half of the continent. And the highly indebted periphery is in revolt. Politically, the center may not hold and things seem to be falling apart. From the left, parties like Syriza in Greece are challenging the EU’s prescriptions of austerity. From the right, Euroskeptic parties are taking aim at the entire quasi-federal model. Racism and xenophobia are gaining ever more adherents, even in previously placid regions like Scandinavia. Perhaps the primary social challenge facing Europe at the moment, however, is the surging popularity of Islamophobia, the latest “socialism of fools.” From the killings at the Munich Olympics in 1972 to the recent attacks at Charlie Hebdo and a kosher supermarket in Paris, wars in the Middle East have long inspired proxy battles in Europe. Today, however, the continent finds itself ever more divided between a handful of would-be combatants who claim the mantle of true Islam and an ever-growing contingent who believe Islam — all of Islam — has no place in Europe.
  • Europeans are beginning to realize that Margaret Thatcher was wrong and there are alternatives — to liberalism and European integration. The most notorious example of this new illiberalism is Hungary. On July 26, 2014, in a speech to his party faithful, Prime Minister Viktor Orban confided that he intended a thorough reorganization of the country. The reform model Orban had in mind, however, had nothing to do with the United States, Britain, or France. Rather, he aspired to create what he bluntly called an “illiberal state” in the very heart of Europe, one strong on Christian values and light on the libertine ways of the West. More precisely, what he wanted was to turn Hungary into a mini-Russia or mini-China. “Societies founded upon the principle of the liberal way,” Orban intoned, “will not be able to sustain their world-competitiveness in the following years, and more likely they will suffer a setback, unless they will be able to substantially reform themselves.” He was also eager to reorient to the east, relying ever less on Brussels and ever more on potentially lucrative markets in and investments from Russia, China, and the Middle East.
  • For some, the relationship between Hungary and the rest of Europe is reminiscent of the moment in the 1960s when Albania fled the Soviet bloc and, in an act of transcontinental audacity, aligned itself with Communist China. But Albania was then a marginal player and China still a poor peasant country. Hungary is an important EU member and China’s illiberal development model, which has vaulted it to the top of the global economy, now has increasing international influence. This, in other words, is no Albanian mouse that roared. A new illiberal axis connecting Budapest to Beijing and Moscow would have far-reaching implications.
  • ...4 more annotations...
  • That July speech represented a truly Oedipal moment, for Orban was eager to drive a stake right through the heart of the ideology that had fathered him. As a young man more than 25 years earlier, he had led the Alliance of Young Democrats — Fidesz — one of the region’s most promising liberal parties. In the intervening years, sensing political opportunity elsewhere on the political spectrum, he had guided Fidesz out of the Liberal International and into the European People’s Party, alongside German Chancellor Angela Merkel’s Christian Democrats. Now, however, he was on the move again and his new role model wasn’t Merkel, but Russian President Vladimir Putin and his iron-fisted style of politics. Given the disappointing performance of liberal economic reforms and the stinginess of the EU, it was hardly surprising that Orban had decided to hedge his bets by looking east. The European Union has responded by harshly criticizing Orban’s government for pushing through a raft of constitutional changes that restrict the media and compromise the independence of the judiciary. Racism and xenophobia are on the uptick in Hungary, particularly anti-Roma sentiment and anti-Semitism. And the state has taken steps to reassert control over the economy and impose controls on foreign investment.
  • The Hungarian prime minister, after all, has many European allies in his Euroskeptical project. Far right parties are climbing in the polls across the continent. With 25% of the votes, Marine Le Pen’s National Front, for instance, topped the French elections for the European parliament last May. In local elections in 2014, it also seized 12 mayoralties, and polls show that Le Pen would win the 2017 presidential race if it were held today. In the wake of the Charlie Hebdo shootings, the National Front has been pushing a range of policies from reinstating the death penalty to closing borders that would deliberately challenge the whole European project. In Denmark, the far-right People’s Party also won the most votes in the European parliamentary elections. In November, it topped opinion polls for the first time. The People’s Party has called for Denmark to slam shut its open-door policy toward refugees and re-introduce border controls. Much as the Green Party did in Germany in the 1970s, groupings like Great Britain’s Independence Party, the Finns Party, and even Sweden’s Democrats are shattering the comfortable conservative-social democratic duopoly that has rotated in power throughout Europe during the Cold War and in its aftermath.
  • The Islamophobia that has surged in the wake of the murders in France provides an even more potent arrow in the quiver of these parties as they take on the mainstream. The sentiment currently expressed against Islam — at rallies, in the media, and in the occasional criminal act — recalls a Europe of long ago, when armed pilgrims set out on a multiple crusades against Muslim powers, when early nation-states mobilized against the Ottoman Empire, and when European unity was forged not out of economic interest or political agreement but as a “civilizational” response to the infidel.
  • Euroskepticism doesn’t only come from the right side of the political spectrum. In Greece, the Syriza party has challenged liberalism from the left, as it leads protests against EU and International Monetary Fund austerity programs that have plunged the population into recession and revolt. As elsewhere in Europe, the far right might have taken advantage of this economic crisis, too, had the government not arrested the Golden Dawn leadership on murder and other charges. In parliamentary elections on Sunday, Syriza won an overwhelming victory, coming only a couple seats short of an absolute majority. In a sign of the ongoing realignment of European politics, that party then formed a new government not with the center-left, but with the right-wing Independent Greeks, which is similarly anti-austerity but also skeptical of the EU and in favor of a crackdown on illegal immigration.
  •  
    Greece and Hungary moving to the right *and toward Russia and China.* The Syrza Party won big in Greece on Sunday. 
Paul Merrell

American Democracy is Owned by the Rich | Al Jazeera America - 1 views

  • Two new studies by political scientists offer compelling evidence that the rich use their wealth to control the political system and that the U.S. is a democratic republic in name only. In a study of Senate voting patterns, Michael Jay Barber found that “senators’ preferences reflect the preferences of the average donor better than any other group.” In a similar study of the House of Representatives, Jesse H. Rhodes and Brian F. Schaffner found that, “millionaires receive about twice as much representation when they comprise about 5 percent of the district’s population than the poorest wealth group does when it makes up 50 percent of the district.” In fact, the increasing influence of the rich over Congress is the leading driver of polarization in modern politics, with the rich using the political system to entrench wealth by pushing for tax breaks and blocking redistributive policies.
  • At the turn of the decade, political scientists Larry Bartels, Jacob Hacker and Martin Gilens wrote several incredibly influential important books arguing, persuasively, that the preferences of the rich were better represented in Congress than the poor. After the books were published, there was a flurry of research arguing that they had overstated their case. Critics alleged two key defects in Bartels’ and Gilens’ arguments. First, because polling data on the super-wealthy were sparse, it was difficult to prove that there were large differences in opinion. Political scientists often rely on composite measures of policy liberalism, but since the poor tend to be more economically liberal but socially conservative, the differences between the poor and moderately rich can often be obscured. Second, there was no way to show that influence of the wealthy was caused directly by the influence of money. It might well be that the rich are simply opinion leaders or are more likely to vote.
  • Recent research offers compelling answers to these criticisms. The new evidence adds credence to the Bartels-Gilens-Hacker view that money is corrupting American politics. By using a massive database of ideology that includes the super wealthy, Schaffner and Rhodes found that “members of Congress are much more responsive to the wealthy than to their poor constituents.” However, this difference is not equal between both parties; rather, Democrats are far more responsive to the poor than Republicans. (This is not surprising; other research supports this claim.) They find that both parties strongly favor the upper-middle class, those with $100,000 to $300,000 in wealth. But Republicans are not only more responsive to the rich, but particularly to rich donors. Schaffner and Rhodes argue that, “campaign donations, but not voter registration or participation in primary or general election, may help explain the disproportionate influence of the wealthy among Republican representatives.” Barber’s study is the first to directly examine the policy preferences of the donor class. Barber sent 20,500 letters to people who contributed to 22 Senate elections in 2012 and asked about various policy questions. This allowed Barber to examine the differences in representation between donors and non-donors. His finding: Donors’ preferences tend to be far better represented than non-donors’. The chart below measures the ideological differences between various groups, with 0 indicating a perfect fit. The data show that Senators are almost perfectly aligned with their donors, but rather distant from voters.
  • ...5 more annotations...
  • In fact, politicians are almost perfectly aligned with donors, but less aligned with partisans (people who voted for the Senator and share party affiliation), supporters (people who voted for the Senator) and voters in general. He Barber also finds that donors tend to be far more extreme in their views (see chart below). For instance, while about sixty percent of non-donor Republicans oppose the Affordable Care Act, opposition among donors is “almost unanimous.” Barber also notes that donors tend to be far more extreme than non-donors (see chart). (This is supported by other studies).
  • Such data could explain the rising polarization of Congress, as politicians increasingly respond to their donors, rather than to voters. Political scientists Walter J. Stone and Elizabeth N. Simas have found that challengers raise more money when they take extreme positions, which helps explain why incumbent representatives tend to be more partisan than departing representatives. It certainly explains the intransigence of the last two Congresses: Republicans, who are responding to their rich donor base, are incentivized to oppose any action, particularly those supporting Obama, lest they lose funding. Since Senators have to raise approximately $3,300 a day every year for six years to remain viable, they will inevitably have to succumb to the power of money if they wish to be reelected. This research raises the disturbing thought that our political system is no longer representative. As Barber notes, about half of all donors are from out of state, meaning that politicians are no longer responsive to their voters (though they are slightly more during election years). Given that only .22 percent of Americans made a donation of more than $200 (the level Barber studies) in 2014, we have power evidence that America is now a government of the one percent — indeed, of the one-fifth of one percent.
  • This disturbing trend affects politics at all levels. At the state level, political scientists Gerald Wright and Elizabeth Rigby found that state party platforms are far more influenced by the rich than the poor. Elsewhere, Barber found evidence that presidents are more responsive to donors than non-donors. Recently Griffin and Newman found representation gaps between whites and people of color as well as low-income voters. This finding is supported by Christopher Ellis, who found that donors were better represented than non-donors (although using a less comprehensive method than Barber). In a frank moment, U.S. Sen. Chris Murphy (D – Conn.) said, “I talked a lot more about carried interest inside of that call room than I did in the supermarket.” He’s correct: Donors tending to be far richer and wealthier than non-donors (see chart).
  • There are still unanswered questions. It is possible that politicians cast ideological votes to appease donors and partisans (for instance, the vain attempt to repeal the Affordable Care Act dozens of times), while also working to benefit the poor and middle class through less visible means. This might explain why political journalists, who often focus on major legislation, miss the distributional impacts of political appointments and regulatory action. It may be that politicians work to maximize votes, and then political donations follow (though there is strong evidence this isn’t the case). Either way, the most up-to-date evidence strongly suggests that money is distorting our system, and that evidence appears to be growing stronger by the day.
  • The solution, as a recent Demos report suggests, is to help reformist candidates gather donations with a public matching system. Since voters who are non-donors are less ideological, the solution is to balance out the political distortions from the donor class by turning these non-donors into donors. Citizens United has only increased the stranglehold of moneyed interests on our political system, and is daily choking the life of our democracy. Only by restoring influence to all voters will our republic be restored.
Gary Edwards

The Fourth Industrial Revolution: what it means and how to respond - Agenda - The World... - 0 views

  • The First Industrial Revolution used water and steam power to mechanize production. The Second used electric power to create mass production. The Third used electronics and information technology to automate production. Now a Fourth Industrial Revolution is building on the Third, the digital revolution that has been occurring since the middle of the last century. It is characterized by a fusion of technologies that is blurring the lines between the physical, digital, and biological spheres.
  • Like the revolutions that preceded it, the Fourth Industrial Revolution has the potential to raise global income levels and improve the quality of life for populations around the world. To date, those who have gained the most from it have been consumers able to afford and access the digital world; technology has made possible new products and services that increase the efficiency and pleasure of our personal lives. Ordering a cab, booking a flight, buying a product, making a payment, listening to music, watching a film, or playing a game—any of these can now be done remotely.
  • In the future, technological innovation will also lead to a supply-side miracle, with long-term gains in efficiency and productivity. Transportation and communication costs will drop, logistics and global supply chains will become more effective, and the cost of trade will diminish, all of which will open new markets and drive economic growth.
  • ...16 more annotations...
  • As automation substitutes for labor across the entire economy, the net displacement of workers by machines might exacerbate the gap between returns to capital and returns to labor. On the other hand, it is also possible that the displacement of workers by technology will, in aggregate, result in a net increase in safe and rewarding jobs.
  • I am convinced of one thing—that in the future, talent, more than capital, will represent the critical factor of production.
  • This will give rise to a job market increasingly segregated into “low-skill/low-pay” and “high-skill/high-pay” segments, which in turn will lead to an increase in social tensions.
  • In addition to being a key economic concern, inequality represents the greatest societal concern associated with the Fourth Industrial Revolution.
  • The largest beneficiaries of innovation tend to be the providers of intellectual and physical capital—the innovators, shareholders, and investors—which explains the rising gap in wealth between those dependent on capital versus labor.
  • Technology is therefore one of the main reasons why incomes have stagnated, or even decreased, for a majority of the population in high-income countries: the demand for highly skilled workers has increased while the demand for workers with less education and lower skills has decreased. The result is a job market with a strong demand at the high and low ends, but a hollowing out of the middle.
  • A winner-takes-all economy that offers only limited access to the middle class is a recipe for democratic malaise and dereliction.
  • An underlying theme in my conversations with global CEOs and senior business executives is that the acceleration of innovation and the velocity of disruption are hard to comprehend or anticipate and that these drivers constitute a source of constant surprise, even for the best connected and most well informed. Indeed, across all industries, there is clear evidence that the technologies that underpin the Fourth Industrial Revolution are having a major impact on businesses.
  • On the supply side, many industries are seeing the introduction of new technologies that create entirely new ways of serving existing needs and significantly disrupt existing industry value chains. Disruption is also flowing from agile, innovative competitors who, thanks to access to global digital platforms for research, development, marketing, sales, and distribution, can oust well-established incumbents faster than ever by improving the quality, speed, or price at which value is delivered.
  • Major shifts on the demand side are also occurring, as growing transparency, consumer engagement, and new patterns of consumer behavior (increasingly built upon access to mobile networks and data) force companies to adapt the way they design, market, and deliver products and services.
  • A key trend is the development of technology-enabled platforms that combine both demand and supply to disrupt existing industry structures, such as those we see within the “sharing” or “on demand” economy. These technology platforms, rendered easy to use by the smartphone, convene people, assets, and data—thus creating entirely new ways of consuming goods and services in the process. In addition, they lower the barriers for businesses and individuals to create wealth, altering the personal and professional environments of workers. These new platform businesses are rapidly multiplying into many new services, ranging from laundry to shopping, from chores to parking, from massages to travel.
  • On the whole, there are four main effects that the Fourth Industrial Revolution has on business—on customer expectations, on product enhancement, on collaborative innovation, and on organizational forms.
  • Overall, the inexorable shift from simple digitization (the Third Industrial Revolution) to innovation based on combinations of technologies (the Fourth Industrial Revolution) is forcing companies to reexamine the way they do business. The bottom line, however, is the same: business leaders and senior executives need to understand their changing environment, challenge the assumptions of their operating teams, and relentlessly and continuously innovate.
  • governments will increasingly face pressure to change their current approach to public engagement and policymaking, as their central role of conducting policy diminishes owing to new sources of competition and the redistribution and decentralization of power that new technologies make possible.
  • Ultimately, the ability of government systems and public authorities to adapt will determine their survival. If they prove capable of embracing a world of disruptive change, subjecting their structures to the levels of transparency and efficiency that will enable them to maintain their competitive edge, they will endure. If they cannot evolve, they will face increasing trouble.
  • In the end, it all comes down to people and values. We need to shape a future that works for all of us by putting people first and empowering them. In its most pessimistic, dehumanized form, the Fourth Industrial Revolution may indeed have the potential to “robotize” humanity and thus to deprive us of our heart and soul. But as a complement to the best parts of human nature—creativity, empathy, stewardship—it can also lift humanity into a new collective and moral consciousness based on a shared sense of destiny. It is incumbent on us all to make sure the latter prevails.
Gary Edwards

"War is a Racket" by General Smedly Butler - 1 views

  • by MAJOR GENERAL SMEDLEY D. BUTLER, USMC - Retired TWO-TIME Congressional Medal of Honor Recipient FULL TEXT ON LINE FREE
  • GET THE NEW PAPERBACK EDITION including two bonus titles.
  •  
    An accidental find, the full text online of USMC Maj. Gen. Smedley Butler's 1935 book, War Is a Racket. Butler served in the Marine Corps from 1899 to 1931 and at the time of his retirement was the most-decorated Marine in history, for both valor and accomplishments. Following his retirement, he became a vehement anti-war activist and public speaker.  This book is easily his most-cited and most-quoted published work. You can capture the flavor from an article he published in a magazine that included the following lines: "I spent 33 years and four months in active military service and during that period I spent most of my time as a high class muscle man for Big Business, for Wall Street and the bankers. In short, I was a racketeer, a gangster for capitalism. I helped make Mexico and especially Tampico safe for American oil interests in 1914. I helped make Haiti and Cuba a decent place for the National City Bank boys to collect revenues in. I helped in the raping of half a dozen Central American republics for the benefit of Wall Street. I helped purify Nicaragua for the International Banking House of Brown Brothers in 1902-1912. I brought light to the Dominican Republic for the American sugar interests in 1916. I helped make Honduras right for the American fruit companies in 1903. In China in 1927 I helped see to it that Standard Oil went on its way unmolested. Looking back on it, I might have given Al Capone a few hints. The best he could do was to operate his racket in three districts. I operated on three continents." http://en.wikipedia.org/wiki/Smedley_Butler#Lectures  I look forward to reading this book. The book was reprinted in 2003 and is available from the linked web site, together with two bonus titles. 
  •  
    "WAR IS A RACKET" - free online book CHAPTER ONE WAR is a racket. It always has been. It is possibly the oldest, easily the most profitable, surely the most vicious. It is the only one international in scope. It is the only one in which the profits are reckoned in dollars and the losses in lives. A racket is best described, I believe, as something that is not what it seems to the majority of the people. Only a small "inside" group knows what it is about. It is conducted for the benefit of the very few, at the expense of the very many. Out of war a few people make huge fortunes. In the World War [I] a mere handful garnered the profits of the conflict. At least 21,000 new millionaires and billionaires were made in the United States during the World War. That many admitted their huge blood gains in their income tax returns. How many other war millionaires falsified their tax returns no one knows. How many of these war millionaires shouldered a rifle? How many of them dug a trench? How many of them knew what it meant to go hungry in a rat-infested dug-out? How many of them spent sleepless, frightened nights, ducking shells and shrapnel and machine gun bullets? How many of them parried a bayonet thrust of an enemy? How many of them were wounded or killed in battle? Out of war nations acquire additional territory, if they are victorious. They just take it. This newly acquired territory promptly is exploited by the few - the selfsame few who wrung dollars out of blood in the war. The general public shoulders the bill. And what is this bill? This bill renders a horrible accounting. Newly placed gravestones. Mangled bodies. Shattered minds. Broken hearts and homes. Economic instability. Depression and all its attendant miseries. Back-breaking taxation for generations and generations. For a great many years, as a soldier, I had a suspicion that war was a racket; not until I retired to civil life did I fully realize it. Now that I see the international war clouds g
Paul Merrell

Israel election: Binyamin Netanyahu rules out Palestinian state if he wins | World news... - 1 views

  • Israel’s prime minister Binyamin Netanyahu has unequivocally ruled out the establishment of a Palestinian state as he vowed to strengthen construction of settlements in occupied east Jerusalem should he be re-elected on Tuesday. Netanyahu’s comments reinforced his hardening message of recent days and confirmed his final abandonment of his at best tepid commitment to a two-state solution designed to see the creation of an independent Palestinian state. His remarks were made in an interview with a website owned by US casino magnate Sheldon Adelson - Netanyahu’s biggest backer - and were being viewed by his political opponents as a last-ditch effort to sway voters away from the rival far-right Jewish Home party of Naftali Bennett.
  • “I think that anyone who moves to establish a Palestinian state and evacuate territory gives territory away to radical Islamist attacks against Israel,” Netanyahu said. “The left has buried its head in the sand time and after time and ignores this, but we are realistic and understand.” When asked if that meant a Palestinian state would not be established if he is elected, Netanyahu replied: “Indeed.” While his remarks will be seen in large part as election rhetoric designed to cement his standing with his country’s hard right at a time when Netanyahu has been struggling in his campaign, they will further strain relations with the US and other key allies should he win a third consecutive term.
  •  
    We probably won't know for a few days because the vote is so close in early returns, but there's broad agreement nonetheless that Netanyahu's Likud Party is in the best position to form the new ruling coalition. So most likely, Netanyahu continues as Israel's PM. If he remains as PM, I see no way that Obama and the U.N. Security Council can duck making a response that is more than a wrist slap and fairly swiftly. This will set the Muslim world afire and ramp up the Boycott, Sanctions, and Divestment movement enormously both in the E.U. and the U.S. I'd guess that unless Obama decides to get out ahead of the global reaction, the first action will be taken by individual European nations imposing labeling on all imports originating from Israeli settlements and very conceivably economic sanctions againt Israeli imports. That's likely to mushroom fairly quickly to E.U. action. Netanyahu's statements also robs the Israel Lobby in the U.S. of its "negotiated solution" script that has been their bedrock sound-bite since the 1970s. I've linked The Guardian article because it includes the most outrageous quotes, but this has broken into mainsream U.S. media. You can watch the video (with English subtitles) at The New York Times. . I'll add some more in a comment.   I've b  Barring a blunt repudiation of his promise that there would be no two-state solution (which Netanyahu will not do without a gun aimed at his head) neither Israel nor the U.S. will be able to maintain the fig leaf of a negotiated agreement between Israel and the Palestine LIberation Authority establishing a Palestinian state. 
Paul Merrell

The Handover - An FP Slideshow | Foreign Policy - 0 views

  • Tuesday marked a milestone for the 12-year-old war in Afghanistan, with NATO forces officially handing over responsibility for the country's security to Afghan government forces. Since 2010, when President Barack Obama accelerated training as part of his rapid surge of forces into the country, the Afghan National Army has grown from around 100,000 members to 195,000. But it still faces a number of challenges, including a desertion rate so high that it needs 50,000 new recruits every year to replace those who leave). In December 2012, a Pentagon report determined that only one of the Afghan military's 23 brigades was able to operate effectively without NATO support. Now, Afghan troops will have to do just that; except in rare cases, they will no longer be able to rely on the support of U.S. warplanes, medical evacuation helicopters, or ground troops.
  • Tuesday marked a milestone for the 12-year-old war in Afghanistan, with NATO forces officially handing over responsibility for the country's security to Afghan government forces. Since 2010, when President Barack Obama accelerated training as part of his rapid surge of forces into the country, the Afghan National Army has grown from around 100,000 members to 195,000. But it still faces a number of challenges, including a desertion rate so high that it needs 50,000 new recruits every year to replace those who leave). In December 2012, a Pentagon report determined that only one of the Afghan military's 23 brigades was able to operate effectively without NATO support. Now, Afghan troops will have to do just that; except in rare cases, they will no longer be able to rely on the support of U.S. warplanes, medical evacuation helicopters, or ground troops. Here's a look back at the long preparation for this week's big handover. An Afghan National Army soldier assigned to the Mobile Strike Force Kandak fires an RPG-7 rocket-propelled grenade launcher during a live-fire exercise supervised by Marines Team on Camp Shorabak, Helmand province, Afghanistan on May 20, 2013.
  •  
    Here in one paragraph are a lot of the reasons two of Obama's claims about U.S. plans in Afghanistan cannot both be true: [i] all U.S. -and NATO combat troops will be withdrawn from Afghanistan by the end of 2014; and [ii] a fairly large contingent of U.S. non-combat troops will remain on U.S. bases in Afghanistan to advise, train, and support the Karzai government's defense forces.  1. The "surge" didn't work even though Obama sent more troops than the military had requested. Even at the peak of U.S. forces in that country, the U.S. military had been beaten back into enclaves by the Taliban. Nonetheless, Obama has  continued to draw down U.S. forces there. NATO allies have been pulling up their tent pegs too. 2. The Afghan government forces are utterly incapable of holding out against the Taliban without strong NATO backing that Obama says is ending. 3. Therefore, a small non-combatant U.S. force left behind after 2014 would be virtually defenseless if left behind. There seems to be no question that U.S. involvement in Afghanistan is winding down steadily. And Obama isn't dumb enough to have a few thousand U.S. troops stay behind to be slaughtered. So his "stay behind" claims are a bluff. The Taliban can read those tea leaves at least as well as I can. This is Vietnam War Redux, also a repeat of the Soviet retreat from Afghanistan. Obama has no credible stick to wield in negotiations with the Taliban. Therefore, the negotiations are either a sham or Obama has to offer the Taliban a carrot of suitable size. The Taliban has no incentive to participate in a sham; they've won their war and the U.S. departure is imminent. Therefore, we need consider what carrot Obama might offer the Taliban. A better royalty agreement on the sidetracked Trans-Afghanistan Pipeline that would supply India with natural gas? .  That doesn't seem enough.  But a consortium of western investors willing to pay royalties t
Paul Merrell

Brazil protesters flood Sao Paulo streets for 2nd night - CBS News - 0 views

  • Tens of thousands of Brazilians again flooded the streets of the country's biggest city to raise a collective cry against a longstanding lament — people are weighed down by high taxes and high prices but get low-quality public services and a system of government infected with corruption. That was the repeated message Tuesday night in Sao Paulo, where upward of 50,000 people massed in front of the city's main cathedral. While mostly peaceful, the demonstration followed the rhythm of protests that drew 240,000 people across Brazil the previous night, with small bands of radicals splitting off to fight with police and break into stores.
  • Mass protests have been mushrooming across Brazil since demonstrations called last week by a group angry over the high cost of a woeful public transport system and a recent 10-cent hike in bus and subway fares in Sao Paulo, Rio and elsewhere
  • The local governments in at least four cities have now agreed to reverse those hikes, and city and federal politicians have shown signs that the Sao Paulo fare could also be rolled back. It's not clear that will calm the country, though, because the protests have released a seething litany of discontent from Brazilians over life's struggles.
  • ...3 more annotations...
  • The protests have brought troubling questions about security in the country, which is playing host this week to soccer's Confederations Cup and will welcome Pope Francis in July for a visit to Rio de Janeiro and rural Sao Paulo.
  • Brazilian demonstrations in recent years generally had tended to attract small numbers of politicized participants, but the latest mobilizations have united huge crowds around a central complaint: The government provides woeful public services even as the economy is modernizing and growing. The Brazilian Tax Planning Institute think tank found that the country's tax burden in 2011 stood at 36 percent of gross domestic product, ranking it 12th among the 30 countries with the world's highest tax burdens. Yet public services such as schools are in sorry shape. The Organization for Economic Co-operation and Development found in a 2009 educational survey that literacy and math skills of Brazilian 15-year-olds ranked 53rd out of 65 countries, behind nations such as Bulgaria, Mexico, Turkey, Trinidad and Tobago, and Romania. Many protesting in Brazil's streets hail from the country's growing middle class, which government figures show has ballooned by some 40 million over the past decade amid a commodities-driven economic boom. They say they've lost patience with endemic problems such as government corruption and inefficiency. They're also slamming Brazil's government for spending billions of dollars to host next year's World Cup soccer tournament and the 2016 Olympics while leaving other needs unmet.
  • A November report from the government raised to $13.3 billion the projected cost of stadiums, airport renovations and other projects for the World Cup. City, state and other local governments are spending more than $12 billion on projects for the Olympics in Rio. Nearly $500 million was spent to renovate Maracana stadium in Rio for the World Cup even though the venue already went through a significant face-lift before the 2007 Pan American Games.
  •  
    Much more detail about the Brazil situation in this Associated Press report. 
Paul Merrell

Bombs Away Over Syria! Washington Has Gone Stark Raving Mad | David Stockman's Contra C... - 0 views

  • Exactly one year ago Obama proposed to take Bashar Al Assad to the woodshed because he had allegedly unleashed a vicious chemical attack on his own citizens. That was all pretext, of course, because even the CIA refused to sign-off on the flimsy case for Assad’s culpability at the time—-a reluctance corroborated since then by the considerable evidence that hundreds of Syrian civilians were murdered during a false flag operation staged by the rebels with help from Turkey. The aim of the rebels, of course, was to activate American tomahawk missiles and bombers in behalf of “regime change”, which was also the stated goal of the Obama Administration. Now the White House is threatening to bomb Syria again, but this time its “regime change” objective has been expanded to include both sides! In 12 short months what had been the allegedly heroic Sunni opposition to the “brutal rule” of the Assad/Alawite minority has transmuted into the “greatest terrorist threat ever”, according to the Secretary of Defense.
  • Adding to this blinding farce is the warning of Syria’s Foreign Affairs minister that Obama should please to request permission before he rains destruction from the sky on the Opposition—-that is, the opposition to the very same Damascus regime which the White House has vowed to eradicate. Needless to say,  the Washington apparatus is having nothing to do with aiding the enemy of its new enemy:
  • In fact, there is apparently an option emerging from the bowels of the war machine that calls for an odd/even day plan to bomb both sides, thereby making clear that Washington is an equal opportunity spanker. Apparently, whether you use a 12th century sword or 20th century attack helicopter as a means of rule, you will be bombed by the “indispensable nation”, as Obama put it, adding that “no other nation can do what we do”. Well, that involves some “doing”. According to AP, it appears that Syrian airstrikes are imminent, but could be carried out under the odd/even day plan: “In an effort to avoid unintentionally strengthening the Syrian government, the White House could seek to balance strikes against the Islamic State with attacks on Assad regime targets.” Is any more evidence needed that Washington has gone stark raving mad than even the possibility that such an absurd option could  be under consideration? Has not the imperial city on the Potomac become so inured to its pretensions of global hegemony and to instant resort to deployment of its war machine that any semblance of rationality and coherence has been dissolved?
  • ...2 more annotations...
  • So let the region rearrange itself without Washington’s unwelcome meddling and mayhem. If Turkey and an independent Kurdistan can make mutually acceptable political and economic arrangements, which are already well-advanced, so be it. If the Shiite south in Iraq and the  Alawite/Shiite southwest in Syria break-off from their present Europe-bequeathed boundaries and form independent regimes, how does that jeopardize the safety and security of the citizens of Lincoln NE and Spokane WA? And, yes, if the Islamic State temporarily manages to coalesce within the Sunni lands of the Euphrates Valley and the upper Tigress why is that really a national security threat which requires launching an unwinnable war, a new round of hostility to America in the Islamic world and the blowback of legions of jihadi with a score to settle?
  • Why would you believe that a viable state can be built in today’s world on the tactics of Genghis Kahn? The Islamic State, such as it is, is not rich, does not have enough oil to make a difference, will soon be bogged down in the insuperable problems of governance by the sword and will flounder on the impoverished economics of the dusty villages and desert expanse which comprise its natural territory. And it will eventually mobilize its neighbors—-Turkey, Hezbollah, the rump regime of Assad’s Alawite Syria, Kurdistan, the Shiite alliance of Iran and lower Iraq, and even Saudi Arabia and the oil sheikdoms—to contain its external ambitions. So Washington should call off the bombers and get out of harm’s way. The American Imperium has failed and the prospect of bombing both sides of an irrelevant non-country’s ancient tribal wars ought, at last, to make that much clear.
  •  
    David Stockman sees some hilarity in Obama's decision to bomb Syria. 
Paul Merrell

CURIA - Documents - 0 views

  • 37      It must be stated that the interference caused by Directive 2006/24 with the fundamental rights laid down in Articles 7 and 8 of the Charter is, as the Advocate General has also pointed out, in particular, in paragraphs 77 and 80 of his Opinion, wide-ranging, and it must be considered to be particularly serious. Furthermore, as the Advocate General has pointed out in paragraphs 52 and 72 of his Opinion, the fact that data are retained and subsequently used without the subscriber or registered user being informed is likely to generate in the minds of the persons concerned the feeling that their private lives are the subject of constant surveillance.
  • 43      In this respect, it is apparent from recital 7 in the preamble to Directive 2006/24 that, because of the significant growth in the possibilities afforded by electronic communications, the Justice and Home Affairs Council of 19 December 2002 concluded that data relating to the use of electronic communications are particularly important and therefore a valuable tool in the prevention of offences and the fight against crime, in particular organised crime. 44      It must therefore be held that the retention of data for the purpose of allowing the competent national authorities to have possible access to those data, as required by Directive 2006/24, genuinely satisfies an objective of general interest.45      In those circumstances, it is necessary to verify the proportionality of the interference found to exist.46      In that regard, according to the settled case-law of the Court, the principle of proportionality requires that acts of the EU institutions be appropriate for attaining the legitimate objectives pursued by the legislation at issue and do not exceed the limits of what is appropriate and necessary in order to achieve those objectives (see, to that effect, Case C‑343/09 Afton Chemical EU:C:2010:419, paragraph 45; Volker und Markus Schecke and Eifert EU:C:2010:662, paragraph 74; Cases C‑581/10 and C‑629/10 Nelson and Others EU:C:2012:657, paragraph 71; Case C‑283/11 Sky Österreich EU:C:2013:28, paragraph 50; and Case C‑101/12 Schaible EU:C:2013:661, paragraph 29).
  • 67      Article 7 of Directive 2006/24, read in conjunction with Article 4(1) of Directive 2002/58 and the second subparagraph of Article 17(1) of Directive 95/46, does not ensure that a particularly high level of protection and security is applied by those providers by means of technical and organisational measures, but permits those providers in particular to have regard to economic considerations when determining the level of security which they apply, as regards the costs of implementing security measures. In particular, Directive 2006/24 does not ensure the irreversible destruction of the data at the end of the data retention period.68      In the second place, it should be added that that directive does not require the data in question to be retained within the European Union, with the result that it cannot be held that the control, explicitly required by Article 8(3) of the Charter, by an independent authority of compliance with the requirements of protection and security, as referred to in the two previous paragraphs, is fully ensured. Such a control, carried out on the basis of EU law, is an essential component of the protection of individuals with regard to the processing of personal data (see, to that effect, Case C‑614/10 Commission v Austria EU:C:2012:631, paragraph 37).69      Having regard to all the foregoing considerations, it must be held that, by adopting Directive 2006/24, the EU legislature has exceeded the limits imposed by compliance with the principle of proportionality in the light of Articles 7, 8 and 52(1) of the Charter.
  • ...13 more annotations...
  • 58      Directive 2006/24 affects, in a comprehensive manner, all persons using electronic communications services, but without the persons whose data are retained being, even indirectly, in a situation which is liable to give rise to criminal prosecutions. It therefore applies even to persons for whom there is no evidence capable of suggesting that their conduct might have a link, even an indirect or remote one, with serious crime. Furthermore, it does not provide for any exception, with the result that it applies even to persons whose communications are subject, according to rules of national law, to the obligation of professional secrecy. 59      Moreover, whilst seeking to contribute to the fight against serious crime, Directive 2006/24 does not require any relationship between the data whose retention is provided for and a threat to public security and, in particular, it is not restricted to a retention in relation (i) to data pertaining to a particular time period and/or a particular geographical zone and/or to a circle of particular persons likely to be involved, in one way or another, in a serious crime, or (ii) to persons who could, for other reasons, contribute, by the retention of their data, to the prevention, detection or prosecution of serious offences.
  • 1        These requests for a preliminary ruling concern the validity of Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC (OJ 2006 L 105, p. 54).
  • Digital Rights Ireland Ltd (C‑293/12)vMinister for Communications, Marine and Natural Resources,Minister for Justice, Equality and Law Reform,Commissioner of the Garda Síochána,Ireland,The Attorney General,intervener:Irish Human Rights Commission, andKärntner Landesregierung (C‑594/12),Michael Seitlinger,Christof Tschohl and others,
  • JUDGMENT OF THE COURT (Grand Chamber)8 April 2014 (*)(Electronic communications — Directive 2006/24/EC — Publicly available electronic communications services or public communications networks services — Retention of data generated or processed in connection with the provision of such services — Validity — Articles 7, 8 and 11 of the Charter of Fundamental Rights of the European Union)In Joined Cases C‑293/12 and C‑594/12,
  • 34      As a result, the obligation imposed by Articles 3 and 6 of Directive 2006/24 on providers of publicly available electronic communications services or of public communications networks to retain, for a certain period, data relating to a person’s private life and to his communications, such as those referred to in Article 5 of the directive, constitutes in itself an interference with the rights guaranteed by Article 7 of the Charter. 35      Furthermore, the access of the competent national authorities to the data constitutes a further interference with that fundamental right (see, as regards Article 8 of the ECHR, Eur. Court H.R., Leander v. Sweden, 26 March 1987, § 48, Series A no 116; Rotaru v. Romania [GC], no. 28341/95, § 46, ECHR 2000-V; and Weber and Saravia v. Germany (dec.), no. 54934/00, § 79, ECHR 2006-XI). Accordingly, Articles 4 and 8 of Directive 2006/24 laying down rules relating to the access of the competent national authorities to the data also constitute an interference with the rights guaranteed by Article 7 of the Charter. 36      Likewise, Directive 2006/24 constitutes an interference with the fundamental right to the protection of personal data guaranteed by Article 8 of the Charter because it provides for the processing of personal data.
  • 65      It follows from the above that Directive 2006/24 does not lay down clear and precise rules governing the extent of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter. It must therefore be held that Directive 2006/24 entails a wide-ranging and particularly serious interference with those fundamental rights in the legal order of the EU, without such an interference being precisely circumscribed by provisions to ensure that it is actually limited to what is strictly necessary.66      Moreover, as far as concerns the rules relating to the security and protection of data retained by providers of publicly available electronic communications services or of public communications networks, it must be held that Directive 2006/24 does not provide for sufficient safeguards, as required by Article 8 of the Charter, to ensure effective protection of the data retained against the risk of abuse and against any unlawful access and use of that data. In the first place, Article 7 of Directive 2006/24 does not lay down rules which are specific and adapted to (i) the vast quantity of data whose retention is required by that directive, (ii) the sensitive nature of that data and (iii) the risk of unlawful access to that data, rules which would serve, in particular, to govern the protection and security of the data in question in a clear and strict manner in order to ensure their full integrity and confidentiality. Furthermore, a specific obligation on Member States to establish such rules has also not been laid down.
  • 60      Secondly, not only is there a general absence of limits in Directive 2006/24 but Directive 2006/24 also fails to lay down any objective criterion by which to determine the limits of the access of the competent national authorities to the data and their subsequent use for the purposes of prevention, detection or criminal prosecutions concerning offences that, in view of the extent and seriousness of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter, may be considered to be sufficiently serious to justify such an interference. On the contrary, Directive 2006/24 simply refers, in Article 1(1), in a general manner to serious crime, as defined by each Member State in its national law.61      Furthermore, Directive 2006/24 does not contain substantive and procedural conditions relating to the access of the competent national authorities to the data and to their subsequent use. Article 4 of the directive, which governs the access of those authorities to the data retained, does not expressly provide that that access and the subsequent use of the data in question must be strictly restricted to the purpose of preventing and detecting precisely defined serious offences or of conducting criminal prosecutions relating thereto; it merely provides that each Member State is to define the procedures to be followed and the conditions to be fulfilled in order to gain access to the retained data in accordance with necessity and proportionality requirements.
  • 55      The need for such safeguards is all the greater where, as laid down in Directive 2006/24, personal data are subjected to automatic processing and where there is a significant risk of unlawful access to those data (see, by analogy, as regards Article 8 of the ECHR, S. and Marper v. the United Kingdom, § 103, and M. K. v. France, 18 April 2013, no. 19522/09, § 35).56      As for the question of whether the interference caused by Directive 2006/24 is limited to what is strictly necessary, it should be observed that, in accordance with Article 3 read in conjunction with Article 5(1) of that directive, the directive requires the retention of all traffic data concerning fixed telephony, mobile telephony, Internet access, Internet e-mail and Internet telephony. It therefore applies to all means of electronic communication, the use of which is very widespread and of growing importance in people’s everyday lives. Furthermore, in accordance with Article 3 of Directive 2006/24, the directive covers all subscribers and registered users. It therefore entails an interference with the fundamental rights of practically the entire European population. 57      In this respect, it must be noted, first, that Directive 2006/24 covers, in a generalised manner, all persons and all means of electronic communication as well as all traffic data without any differentiation, limitation or exception being made in the light of the objective of fighting against serious crime.
  • 62      In particular, Directive 2006/24 does not lay down any objective criterion by which the number of persons authorised to access and subsequently use the data retained is limited to what is strictly necessary in the light of the objective pursued. Above all, the access by the competent national authorities to the data retained is not made dependent on a prior review carried out by a court or by an independent administrative body whose decision seeks to limit access to the data and their use to what is strictly necessary for the purpose of attaining the objective pursued and which intervenes following a reasoned request of those authorities submitted within the framework of procedures of prevention, detection or criminal prosecutions. Nor does it lay down a specific obligation on Member States designed to establish such limits. 63      Thirdly, so far as concerns the data retention period, Article 6 of Directive 2006/24 requires that those data be retained for a period of at least six months, without any distinction being made between the categories of data set out in Article 5 of that directive on the basis of their possible usefulness for the purposes of the objective pursued or according to the persons concerned.64      Furthermore, that period is set at between a minimum of 6 months and a maximum of 24 months, but it is not stated that the determination of the period of retention must be based on objective criteria in order to ensure that it is limited to what is strictly necessary.
  • 52      So far as concerns the right to respect for private life, the protection of that fundamental right requires, according to the Court’s settled case-law, in any event, that derogations and limitations in relation to the protection of personal data must apply only in so far as is strictly necessary (Case C‑473/12 IPI EU:C:2013:715, paragraph 39 and the case-law cited).53      In that regard, it should be noted that the protection of personal data resulting from the explicit obligation laid down in Article 8(1) of the Charter is especially important for the right to respect for private life enshrined in Article 7 of the Charter.54      Consequently, the EU legislation in question must lay down clear and precise rules governing the scope and application of the measure in question and imposing minimum safeguards so that the persons whose data have been retained have sufficient guarantees to effectively protect their personal data against the risk of abuse and against any unlawful access and use of that data (see, by analogy, as regards Article 8 of the ECHR, Eur. Court H.R., Liberty and Others v. the United Kingdom, 1 July 2008, no. 58243/00, § 62 and 63; Rotaru v. Romania, § 57 to 59, and S. and Marper v. the United Kingdom, § 99).
  • 26      In that regard, it should be observed that the data which providers of publicly available electronic communications services or of public communications networks must retain, pursuant to Articles 3 and 5 of Directive 2006/24, include data necessary to trace and identify the source of a communication and its destination, to identify the date, time, duration and type of a communication, to identify users’ communication equipment, and to identify the location of mobile communication equipment, data which consist, inter alia, of the name and address of the subscriber or registered user, the calling telephone number, the number called and an IP address for Internet services. Those data make it possible, in particular, to know the identity of the person with whom a subscriber or registered user has communicated and by what means, and to identify the time of the communication as well as the place from which that communication took place. They also make it possible to know the frequency of the communications of the subscriber or registered user with certain persons during a given period. 27      Those data, taken as a whole, may allow very precise conclusions to be drawn concerning the private lives of the persons whose data has been retained, such as the habits of everyday life, permanent or temporary places of residence, daily or other movements, the activities carried out, the social relationships of those persons and the social environments frequented by them.
  • 32      By requiring the retention of the data listed in Article 5(1) of Directive 2006/24 and by allowing the competent national authorities to access those data, Directive 2006/24, as the Advocate General has pointed out, in particular, in paragraphs 39 and 40 of his Opinion, derogates from the system of protection of the right to privacy established by Directives 95/46 and 2002/58 with regard to the processing of personal data in the electronic communications sector, directives which provided for the confidentiality of communications and of traffic data as well as the obligation to erase or make those data anonymous where they are no longer needed for the purpose of the transmission of a communication, unless they are necessary for billing purposes and only for as long as so necessary.
  • On those grounds, the Court (Grand Chamber) hereby rules:Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC is invalid.
  •  
    EU Court of Justice decision in regard to a Directive that required communications data retention by telcos/ISPs, finding the Directive invalid as a violation of the right of privacy in communications. Fairly read, paragraph 59 outlaws bulk collection of such records, i.e., it requires the equivalent of a judge-issued search warrant in the U.S. based on probable cause to believe that the particular individual's communications are a legitimate object of a search.  Note also that paragraph 67 effectively forbids transfer of any retained data outside the E.U. So a barrier for NSA sharing of data with GCHQ derived from communications NSA collects from EU communications traffic. Bye-bye, Big Data for GCHQ in the E.U. 
Paul Merrell

Cy Vance's Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities | Jus... - 0 views

  • Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s District Attorney, released a policy paper calling for legislation requiring companies to provide the government with backdoor access to their smartphones and other mobile devices. This is the first concrete proposal of this type since September 2014, when FBI Director James Comey reignited the “Crypto Wars” in response to Apple’s and Google’s decisions to use default encryption on their smartphones. Though Comey seized on Apple’s and Google’s decisions to encrypt their devices by default, his concerns are primarily related to end-to-end encryption, which protects communications that are in transit. Vance’s proposal, on the other hand, is only concerned with device encryption, which protects data stored on phones. It is still unclear whether encryption played any role in the Paris attacks, though we do know that the attackers were using unencrypted SMS text messages on the night of the attack, and that some of them were even known to intelligence agencies and had previously been under surveillance. But regardless of whether encryption was used at some point during the planning of the attacks, as I lay out below, prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption. Vance’s primary complaint is that Apple’s and Google’s decisions to provide their customers with more secure devices through encryption interferes with criminal investigations. He claims encryption prevents law enforcement from accessing stored data like iMessages, photos and videos, Internet search histories, and third party app data. He makes several arguments to justify his proposal to build backdoors into encrypted smartphones, but none of them hold water.
  • Before addressing the major privacy, security, and implementation concerns that his proposal raises, it is worth noting that while an increase in use of fully encrypted devices could interfere with some law enforcement investigations, it will help prevent far more crimes — especially smartphone theft, and the consequent potential for identity theft. According to Consumer Reports, in 2014 there were more than two million victims of smartphone theft, and nearly two-thirds of all smartphone users either took no steps to secure their phones or their data or failed to implement passcode access for their phones. Default encryption could reduce instances of theft because perpetrators would no longer be able to break into the phone to steal the data.
  • Vance argues that creating a weakness in encryption to allow law enforcement to access data stored on devices does not raise serious concerns for security and privacy, since in order to exploit the vulnerability one would need access to the actual device. He considers this an acceptable risk, claiming it would not be the same as creating a widespread vulnerability in encryption protecting communications in transit (like emails), and that it would be cheap and easy for companies to implement. But Vance seems to be underestimating the risks involved with his plan. It is increasingly important that smartphones and other devices are protected by the strongest encryption possible. Our devices and the apps on them contain astonishing amounts of personal information, so much that an unprecedented level of harm could be caused if a smartphone or device with an exploitable vulnerability is stolen, not least in the forms of identity fraud and credit card theft. We bank on our phones, and have access to credit card payments with services like Apple Pay. Our contact lists are stored on our phones, including phone numbers, emails, social media accounts, and addresses. Passwords are often stored on people’s phones. And phones and apps are often full of personal details about their lives, from food diaries to logs of favorite places to personal photographs. Symantec conducted a study, where the company spread 50 “lost” phones in public to see what people who picked up the phones would do with them. The company found that 95 percent of those people tried to access the phone, and while nearly 90 percent tried to access private information stored on the phone or in other private accounts such as banking services and email, only 50 percent attempted contacting the owner.
  • ...8 more annotations...
  • In addition to his weak reasoning for why it would be feasible to create backdoors to encrypted devices without creating undue security risks or harming privacy, Vance makes several flawed policy-based arguments in favor of his proposal. He argues that criminals benefit from devices that are protected by strong encryption. That may be true, but strong encryption is also a critical tool used by billions of average people around the world every day to protect their transactions, communications, and private information. Lawyers, doctors, and journalists rely on encryption to protect their clients, patients, and sources. Government officials, from the President to the directors of the NSA and FBI, and members of Congress, depend on strong encryption for cybersecurity and data security. There are far more innocent Americans who benefit from strong encryption than there are criminals who exploit it. Encryption is also essential to our economy. Device manufacturers could suffer major economic losses if they are prohibited from competing with foreign manufacturers who offer more secure devices. Encryption also protects major companies from corporate and nation-state espionage. As more daily business activities are done on smartphones and other devices, they may now hold highly proprietary or sensitive information. Those devices could be targeted even more than they are now if all that has to be done to access that information is to steal an employee’s smartphone and exploit a vulnerability the manufacturer was required to create.
  • Privacy is another concern that Vance dismisses too easily. Despite Vance’s arguments otherwise, building backdoors into device encryption undermines privacy. Our government does not impose a similar requirement in any other context. Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation. The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.
  • Vance attempts to downplay this serious risk by asserting that anyone can use the “Find My Phone” or Android Device Manager services that allow owners to delete the data on their phones if stolen. However, this does not stand up to scrutiny. These services are effective only when an owner realizes their phone is missing and can take swift action on another computer or device. This delay ensures some period of vulnerability. Encryption, on the other hand, protects everyone immediately and always. Additionally, Vance argues that it is safer to build backdoors into encrypted devices than it is to do so for encrypted communications in transit. It is true that there is a difference in the threats posed by the two types of encryption backdoors that are being debated. However, some manner of widespread vulnerability will inevitably result from a backdoor to encrypted devices. Indeed, the NSA and GCHQ reportedly hacked into a database to obtain cell phone SIM card encryption keys in order defeat the security protecting users’ communications and activities and to conduct surveillance. Clearly, the reality is that the threat of such a breach, whether from a hacker or a nation state actor, is very real. Even if companies go the extra mile and create a different means of access for every phone, such as a separate access key for each phone, significant vulnerabilities will be created. It would still be possible for a malicious actor to gain access to the database containing those keys, which would enable them to defeat the encryption on any smartphone they took possession of. Additionally, the cost of implementation and maintenance of such a complex system could be high.
  • Vance also suggests that the US would be justified in creating such a requirement since other Western nations are contemplating requiring encryption backdoors as well. Regardless of whether other countries are debating similar proposals, we cannot afford a race to the bottom on cybersecurity. Heads of the intelligence community regularly warn that cybersecurity is the top threat to our national security. Strong encryption is our best defense against cyber threats, and following in the footsteps of other countries by weakening that critical tool would do incalculable harm. Furthermore, even if the US or other countries did implement such a proposal, criminals could gain access to devices with strong encryption through the black market. Thus, only innocent people would be negatively affected, and some of those innocent people might even become criminals simply by trying to protect their privacy by securing their data and devices. Finally, Vance argues that David Kaye, UN Special Rapporteur for Freedom of Expression and Opinion, supported the idea that court-ordered decryption doesn’t violate human rights, provided certain criteria are met, in his report on the topic. However, in the context of Vance’s proposal, this seems to conflate the concepts of court-ordered decryption and of government-mandated encryption backdoors. The Kaye report was unequivocal about the importance of encryption for free speech and human rights. The report concluded that:
  • States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online. … States should not restrict encryption and anonymity, which facilitate and often enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows. Additionally, the group of intelligence experts that was hand-picked by the President to issue a report and recommendations on surveillance and technology, concluded that: [R]egarding encryption, the U.S. Government should: (1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.
  • The clear consensus among human rights experts and several high-ranking intelligence experts, including the former directors of the NSA, Office of the Director of National Intelligence, and DHS, is that mandating encryption backdoors is dangerous. Unaddressed Concerns: Preventing Encrypted Devices from Entering the US and the Slippery Slope In addition to the significant faults in Vance’s arguments in favor of his proposal, he fails to address the question of how such a restriction would be effectively implemented. There is no effective mechanism for preventing code from becoming available for download online, even if it is illegal. One critical issue the Vance proposal fails to address is how the government would prevent, or even identify, encrypted smartphones when individuals bring them into the United States. DHS would have to train customs agents to search the contents of every person’s phone in order to identify whether it is encrypted, and then confiscate the phones that are. Legal and policy considerations aside, this kind of policy is, at the very least, impractical. Preventing strong encryption from entering the US is not like preventing guns or drugs from entering the country — encrypted phones aren’t immediately obvious as is contraband. Millions of people use encrypted devices, and tens of millions more devices are shipped to and sold in the US each year.
  • Finally, there is a real concern that if Vance’s proposal were accepted, it would be the first step down a slippery slope. Right now, his proposal only calls for access to smartphones and devices running mobile operating systems. While this policy in and of itself would cover a number of commonplace devices, it may eventually be expanded to cover laptop and desktop computers, as well as communications in transit. The expansion of this kind of policy is even more worrisome when taking into account the speed at which technology evolves and becomes widely adopted. Ten years ago, the iPhone did not even exist. Who is to say what technology will be commonplace in 10 or 20 years that is not even around today. There is a very real question about how far law enforcement will go to gain access to information. Things that once seemed like merely science fiction, such as wearable technology and artificial intelligence that could be implanted in and work with the human nervous system, are now available. If and when there comes a time when our “smart phone” is not really a device at all, but is rather an implant, surely we would not grant law enforcement access to our minds.
  • Policymakers should dismiss Vance’s proposal to prohibit the use of strong encryption to protect our smartphones and devices in order to ensure law enforcement access. Undermining encryption, regardless of whether it is protecting data in transit or at rest, would take us down a dangerous and harmful path. Instead, law enforcement and the intelligence community should be working to alter their skills and tactics in a fast-evolving technological world so that they are not so dependent on information that will increasingly be protected by encryption.
1 - 20 of 26 Next ›
Showing 20 items per page