Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged appropriations

Rss Feed Group items tagged

Gary Edwards

U.S. to Become Tax Debtors' Prison - 0 views

  •  
    International Passports could be held in lew of back taxes if Senate Bill 1813, the deliciously named "Moving Ahead for Progressives" Act, gets through the House. excerpt: A bill authored by a Southland lawmaker that could potentially allow the federal government to prevent any Americans who owe back taxes from traveling outside the U.S. is one step closer to becoming law. Senate Bill 1813 was introduced back in November by Senator Barbara Boxer (D-Los Angeles) to "reauthorize Federal-aid highway and highway safety construction programs, and for other purposes". After clearing the Senate on a 74 - 22 vote on March 14, SB 1813 is now headed for a vote in the House of Representatives, where it's expected to encounter stiffer opposition among the GOP majority. In addition to authorizing appropriations for federal transportation and infrastructure programs, the "Moving Ahead for Progress in the 21st Century Act" or "MAP-21″ includes a provision that would allow for the "revocation or denial" of a passport for anyone with "certain unpaid taxes" or "tax delinquencies". Section 40304 of the legislation states that any individual who owes more than $50,000 to the Internal Revenue Service may be subject to "action with respect to denial, revocation, or limitation of a passport". The bill does allow for exceptions in the event of emergency or humanitarian situations or limited return travel to the U.S., or in cases when any tax debt is currently being repaid in a "timely manner" or when collection efforts have been suspended. However, there does not appear to be any specific language requiring a taxpayer to be charged with tax evasion or any other crime in order to have their passport revoked or limited - only that a notice of lien or levy has been filed by the IRS.
Gary Edwards

The Police State Is Here by Tim Kelly - The Future of Freedom Foundation - 0 views

  •  
    Hat tip to marbux for this catch.  Tim Kelly walks us through the increasingly rapid decline of American liberty, and our fall into the clutches of an ever growing police state.  Nicely written.  No solutions given.  I suggest we declare any effort,that violates the Constitutional rights of an American citizen as an act of treason,  especially if committed, unknowingly or knowingly authorized, or voted on by a public servant sworn to uphold and defend the Constitution.   excerpt: The intent of this short essay is not to provide a "list of horribles" committed by the government (although such an accounting is useful) but to point out that the much-feared police state has come into being. Its growth had been gradual, which contributed to the public's indifference, but it metastasized after 9/11, when the remaining legal barriers to the state's expansion were taken down in the name of "national security." A large portion of the public appears to be appropriately alarmed, but it remains to be seen whether this will reach a critical mass in time to reverse the country's destructive course.
Gary Edwards

Gang of 545 and The Basic Flaw by Charley Reese - 2 views

  •  
    Enough said.  Beautifully done Charlie! intro: Politicians are the only people in the world who create problems and then campaign against them. Have you ever wondered why, if both the Democrats and the Republicans are against deficits, we have deficits? Have you ever wondered why, if all the politicians are against inflation and high taxes, we have inflation and high taxes? You and I don't propose a federal budget. The president does. You and I don't have the Constitutional authority to vote on appropriations. The House of Representatives does. You and I don't write the tax code. Congress does. You and I don't set fiscal policy. Congress does. You and I don't control monetary policy. The Federal Reserve Bank does. One hundred senators, 435 congressmen, one president and nine Supreme Court justices - 545 human beings out of the 235 million - are directly, legally, morally and individually responsible for the domestic problems that plague this country.
  •  
    Bay Area Patriot Group post
Gary Edwards

The Roberts Jizya and the Art of War - 0 views

  • he is violating his oath of office in doing so, and that is the only sensible explanation because the Constitution is fairly clear; the United States Constitution expressly grants all powers not specifically enumerated in the document to the states and the People, and nowhere is this particular tax authorized.
  • this is rather like Jizya, the Muslim concept of taxation on non-Muslims.
  • The purpose of the Islamic Jizya is to compel approved behavior, and as such has been a powerful tool used by Islamic societies to compel conversion to Islam
  • ...10 more annotations...
  • In this instance the United States government is using it to compel conversion to socialist medicine, forcing us to either buy expensive private insurance or go on the government plan.
  • In short, they are abridging our freedom of religion, a constitutionally protected category.
  • What is clear is that this is an abridgement of the Establishment clause, and of the First Amendment.
  • The argument that this saves us from a super-stretching of the Commerce Clause is immaterial; we have simply replaced it with a super-stretching of the power of taxation. In the end, dead is just as dead.
  • What is really needed is a Constitutional Amendment, and the individual states need to spearhead that.
  • We have allowed the United States to move from a representative democratic republic to an empire, a system dominated by a ruling elite, an oligarchy.
  • We must return to the Federalism that was at the core of the Republic.
  • He is a traitor to his oath, a Benedict Arnold in a black robe
  • He has placed his desire for self-aggrandizement over his duty, and so has affirmed the power of government and the ruling elite to do anything to the public they please.
  • It’s time we take this country back. That can only happen at the state level.
  •  
    Another well written article describing in full what that treasonous backstabbing bastard chief justice John Roberts has done to shred and destroy our Constitution.  Thanks to the Canadian Free Press and Timothy Birdnow. excerpt: So, why is this so important to our discussion of the ruling by the Roberts Court? Because many on our side seem to believe that John Roberts did us a favor in his decision upholding the Affordable Healthcare Act, or as it is known colloquially, Obamacare. The argument in conservative circles for a silver lining to this dark cloud of human bodily excretions is that this ends the debate over the right to use the Commerce Clause to justify any action of Congress and that it hangs this around Osama's neck, a huge tax increase, for the November elections. While a little soothing may be in order we are making a terrible mistake here, because, A.) an eggplant could see this is unconstitutional and, B.) it simply kicks the can down the road, forcing us to fight yet another unnecessary battle. We should have declared victory here. First, this is not a mere political move on Roberts part. He is Chief Justice of the Supreme Court, and as such is not going to tie his name to a partisan decision that will be read about in American textbooks. If he is to violate his oath it will be for personal reasons, such as upholding this law against all expectations. What will he gain personally from doing the right thing and striking it down? Upholding such a crazy law guarantees him a spot in the history books. But he is violating his oath of office in doing so, and that is the only sensible explanation because the Constitution is fairly clear; the United States Constitution expressly grants all powers not specifically enumerated in the document to the states and the People, and nowhere is this particular tax authorized. Furthermore, it violates the principle of equality under the law as only some of the public is actually paying a tax; the rest are buyin
Paul Merrell

Pentagon 'big winner' in $1T omnibus bill | TheHill - 0 views

  • The Pentagon and the defense industry came out of the $1 trillion omnibus spending bill as a big winner, experts and lawmakers said Tuesday, a day after the bill was released. “The big winner is the Defense Department. They should be breaking out champagne in the Pentagon,” said Gordon Adams, a defense budget expert and former Clinton official.The omnibus spending bill provides about $497 billion for the Defense Department in 2014 — about the same as in 2013. But the Pentagon also received $85.2 billion in overseas contingency operations (OCO) for the war in Afghanistan, roughly $5 billion more than it requested for 2014.Before last month’s budget deal that relieved $22.4 billion in sequestration cuts, the 2014 defense budget would have been around $475 billion. The OCO funding, which Adams said is the “cherry on top of the dessert,” can be used to pay for operations and maintenance in the base budget and help restore military readiness lost in previous years. Fiscal watchdog and anti-war groups criticized the $5 billion increase from the Pentagon's request in OCO funding as a “slush fund to pad the department’s budget and avoid spending reductions,” especially with the winding down of the Afghan War. 
  • The defense industry was also a winner in the omnibus spending bill, Adams said. All major weapons systems procurement requests were fully-funded, including the F-35 Joint Strike Fighter — the Pentagon’s most expensive weapons system in history. Also fully funded were the Army’s M1 Abrams tank program, and the Navy’s shipbuilding plans for eight new ships. Israel is also a winner in the omnibus spending bill, with money fully provided for the Arrow, David’s Sling, and the Iron Dome rocket defense systems. 
  • While lawmakers touted the completed spending bill as a win for nearly everyone, there were a few losers. One of the most notable losers included the Pentagon’s research and development projects, which received $7 billion less than last year.In addition, the defense space program and the procurement for the E-2D Advanced Hawkeye program were delayed. Also, funds for the Afghan National Security Forces is about half as much as the White House requested, Adams said.
  • ...1 more annotation...
  • Overall, lawmakers said the omnibus spending bill, which is expected to pass this week, was 'a good start'. 
  •  
    The War Party wins again. Spending cuts will come out of non-defense branches of government. Meanwhile, the Judicial Branch is nearly flat on its back because of sequestration. Judicial spending before sequestration was only 0.19 per cent of federal spending (19 cents of each $100) but  $350 million got chopped by sequestration.  The result: things like massive delays in court proceedings and a 35 per cent cut in personnel in the Federal Defenders office, a loss of institutional knowledge that will never be recovered.
Gary Edwards

The Lawless President - 0 views

  •  
    Excellent read!  Peter Ferrara walks us through the latest Obama assault on the Constitution, this time his refusal to enforce laws he disagrees with.  Surprisingly, this now includes the employer mandate portion of ObamaCare!!!  Why he has to do this however is a stunning story. Bottom line:  The latest jobs report has the economy producing 195,000 new jobs in the past quarter.  The problem is, 100% of these new jobs are part-time.  Thanks to ObamaCare.   "The duties of the President of the United States are spelled out in Article II, Section 3 of the Constitution, which states, inter alia, that the President "shall take Care that the laws be faithfully executed." As Stanford Law Professor and former federal judge Michael McConnell explained in yesterday's Wall Street Journal, "This is a duty, not a discretionary power. While the president does have substantial discretion about how to enforce a law, he has no discretion about whether to do so." Section 1513(d) of the Unaffordable Care Act (aka "Obamacare") states unequivocally, "The amendments made by this section shall apply to months beginning after December 31, 2013." In other words, the provisions of Obamacare become fully effective in 2014, as a matter of duly enacted federal law. But over the long Fourth of July weekend, in a "Never Mind" moment, the Obama Administration announced, through a Deputy Assistant Secretary of the Treasury, that contrary to federal law, the employer mandate of Obamacare shall not become fully effective in months beginning after December 31, 2013, but only in months beginning after December 31, 2014. Making the announcement through such a low level Administration official to me says that Obama has contempt for the American people, and for the rule of law. Barack Obama: Lawbreaker But it does not matter who announces it. The President is the one responsible. And the announcement constitutes the assumption of authoritarian powers by President Obama. McCo
Paul Merrell

Why Leaker Chelsea Manning Should Receive Appropriate Medical Care in Prison | David S.... - 0 views

  • The day after after being sentenced to 35 years in prison for leaking classified government materials, Bradley Manning declared that she identified as female and preferred to be known as Chelsea Manning. Having struggled with her gender identity for years while serving in the Army, Manning’s gender identity disorder (GID) played a key role in her trial and sentencing. The question remains whether she will receive the hormone replacement therapy she has requested to receive while in prison at Fort Leavenworth. Although the prison has reportedly issued a statement that it does not provide hormone therapy or gender reassignment surgery, recent case law suggests that it may be constitutionally required to do so.In this column I will consider whether Fort Leavenworth must provide Manning with the requested hormone therapy. I will discuss several federal courts’ decisions on the issue, all of which suggest an affirmative answer to this question. Although Fort Leavenworth is not bound by these courts’ rulings, I argue that both as a matter of policy and as a matter of constitutional law, the prison must provide Manning’s requested treatment.
Gary Edwards

Not Actually a Shutdown | National Review Online - 0 views

  •  
    excerpt: "A 1981 memorandum by David Stockman during the Reagan administration that is still relied on by the OMB laid out the services that continue without interruption during any government "shutdown": .... National security, including the conduct of foreign relations essential to the national security or the safety of life and property; .... Benefit payments and the performance of contract obligations under no-year or multi-year appropriations or other funds remaining available for those purposes; .... Medical care of inpatients and emergency outpatient care and activities essential for the safe use of food, drugs, and hazardous materials; .... Air-traffic control and other transportation safety functions; Border and coastal protection and surveillance; .... Protection of federal lands, buildings, waterways, and other property of the U.S.; .... Care of prisoners and others in federal custody; .... Law enforcement and criminal investigations; .... Emergency and disaster assistance; .... Activities essential to the preservation of the money and banking system of the U.S., including borrowing and tax collection; .... Production of power and maintenance of the power-distribution system; and .... Protection of research property. So planes, trains, and automobiles will keep running and TSA will keep patting you down. The president can continue to go on overseas trips to conduct foreign relations. Social Security and Medicaid benefits will keep going out. The Border Patrol will keep patrolling our borders to prevent illegal crossings (at least as much as this administration will let it do that). The Federal Bureau of Prisons will keep convicted criminals in prison and the FBI will continue making arrests and investigating violations of the law. The FDA and the Department of Agriculture will continue their safety testing and inspection of food and drugs, and medical care of inpatients and emergency outpatient care will keep right on going. The Fed
Paul Merrell

White House OKd spying on allies, U.S. intelligence officials say - latimes.com - 0 views

  • The White House and State Department signed off on surveillance targeting phone conversations of friendly foreign leaders, current and former U.S. intelligence officials said Monday, pushing back against assertions that President Obama and his aides were unaware of the high-level eavesdropping. Professional staff members at the National Security Agency and other U.S. intelligence agencies are angry, these officials say, believing the president has cast them adrift as he tries to distance himself from the disclosures by former NSA contractor Edward Snowden that have strained ties with close allies. The resistance emerged as the White House said it would curtail foreign intelligence collection in some cases and two senior U.S. senators called for investigations of the practice. France, Germany, Italy, Mexico and Sweden have all publicly complained about the NSA surveillance operations, which reportedly captured private cellphone conversations by German Chancellor Angela Merkel, among other foreign leaders.
  • On Monday, as Spain joined the protest, the fallout also spread to Capitol Hill.
  • Until now, members of Congress have chiefly focused their attention on Snowden's disclosures about the NSA's collection of U.S. telephone and email records under secret court orders. "With respect to NSA collection of intelligence on leaders of U.S. allies — including France, Spain, Mexico and Germany — let me state unequivocally: I am totally opposed," said Sen. Dianne Feinstein (D-Calif.), who chairs the Senate Intelligence Committee. "Unless the United States is engaged in hostilities against a country or there is an emergency need for this type of surveillance, I do not believe the United States should be collecting phone calls or emails of friendly presidents and prime ministers," she said in a statement. Feinstein said the Intelligence Committee had not been told of "certain surveillance activities" for more than a decade, and she said she would initiate a major review of the NSA operation. She added that the White House had informed her that "collection on our allies will not continue," although other officials said most U.S. surveillance overseas would not be affected. Sen. John McCain (R-Ariz.), ranking minority member of the Armed Services Committee, said Congress should consider creating a special select committee to examine U.S. eavesdropping on foreign leaders.
  • ...5 more annotations...
  • "Obviously, we're going to want to know exactly what the president knew and when he knew it," McCain told reporters in Chicago. "We have always eavesdropped on people around the world. But the advance of technology has given us enormous capabilities, and I think you might make an argument that some of this capability has been very offensive both to us and to our allies."
  • Precisely how the surveillance is conducted is unclear. But if a foreign leader is targeted for eavesdropping, the relevant U.S. ambassador and the National Security Council staffer at the White House who deals with the country are given regular reports, said two former senior intelligence officials, who spoke on condition of anonymity in discussing classified information. Obama may not have been specifically briefed on NSA operations targeting a foreign leader's cellphone or email communications, one of the officials said. "But certainly the National Security Council and senior people across the intelligence community knew exactly what was going on, and to suggest otherwise is ridiculous." If U.S. spying on key foreign leaders was news to the White House, current and former officials said, then White House officials have not been reading their briefing books. Some U.S. intelligence officials said they were being blamed by the White House for conducting surveillance that was authorized under the law and utilized at the White House. "People are furious," said a senior intelligence official who would not be identified discussing classified information. "This is officially the White House cutting off the intelligence community."
  • Any decision to spy on friendly foreign leaders is made with input from the State Department, which considers the political risk, the official said. Any useful intelligence is then given to the president's counter-terrorism advisor, Lisa Monaco, among other White House officials. Jay Carney, the White House press secretary, said Monday that Obama had ordered a review of surveillance capabilities, including those affecting America's closest foreign partners and allies. "Our review is looking across the board at our intelligence gathering to ensure that as we gather intelligence, we are properly accounting for both the security of our citizens and our allies and the privacy concerns shared by Americans and citizens around the world," Carney said.
  • Caitlin Hayden, spokeswoman for the National Security Council, said the review would examine "whether we have the appropriate posture when it comes to heads of state, how we coordinate with our closest allies and partners, and what further guiding principles or constraints might be appropriate for our efforts." She said the review should be completed this year.
  • Intelligence officials also disputed a Wall Street Journal article Monday that said the White House had learned only this summer — during a review of surveillance operations that might be exposed by Snowden — about an NSA program to monitor communications of 35 world leaders. Since then, officials said, several of the eavesdropping operations have been stopped because of political sensitivities.
  •  
    Good. The Intelligence community is calling BS on Obama's claim that he didn't know about the spying on foreign heads of allied states. And McCain says we need a select Congressional committee to look into what the president knew and when he knew it. That's an implicit slam of the Feinstein-led Senate Select Committee on Intelligence's oversight of the intelligence agencies and a signal that there is a scandal lurking here. More importantly, a new select committee would not have the same membership as the existing Intelligence Community, which has largely functioned as a rubber stamp for what the intelligence agencies want. We have been down this road before, in the mid-70s, when the Defense Dept. intelligence agencies were caught spying on Americans, leading to the Select Committee investigation headed by former Sen. Frank Church and to the initial passage of the Foreign Intelligence Surveillance Act, among other legislation delivering a strong message to the intelligence agencies that what happens within the U.S. is off-limits to them. But that was a lesson forgotten as new technology came along for NSA to play with. If Obama is smart, he will promptly respond to the LA Times article with a clarification that top members of his staff knew and the previous statement dealt only with his personal knowledge. But the Obama Administration has overwhelmingly demonstrated an inability to head off scandals and a big tendency to cover-up rather than get out in front of story, particularly in matters involving the NSA. So we may see a major scandal emerge from this already enormous scandal that is laid directly at Barack Obama's feet, a cover-up scandal.   Who knew what when, where, why, and how? My favorite question. 
Paul Merrell

White House defends 'Cuban Twitter' to stir unrest - Yahoo News - 0 views

  • The Obama administration defended its creation of a Twitter-like Cuban communications network to undermine the communist government, declaring the secret program was "invested and debated" by Congress and wasn't a covert operation that required White House approval.
  • But two senior Democrats on congressional intelligence and judiciary committees said Thursday they had known nothing about the effort, which one of them described as "dumb, dumb, dumb." A showdown with that senator's panel is expected next week, and the Republican chairman of a House oversight subcommittee said that it, too, would look into the program.An Associated Press investigation found that the network was built with secret shell companies and financed through a foreign bank. The project, which lasted more than two years and drew tens of thousands of subscribers, sought to evade Cuba's stranglehold on the Internet with a primitive social media platform.First, the network was to build a Cuban audience, mostly young people. Then, the plan was to push them toward dissent.
  • Yet its users were neither aware it was created by a U.S. agency with ties to the State Department, nor that American contractors were gathering personal data about them, in the hope that the information might be used someday for political purposes.It is unclear whether the scheme was legal under U.S. law, which requires written authorization of covert action by the president as well as congressional notification. White House spokesman Jay Carney said he was not aware of individuals in the White House who had known about the program.
  • ...9 more annotations...
  • USAID's top official, Rajiv Shah, is scheduled to testify on Tuesday before the Senate Appropriations State Department and Foreign Operations Subcommittee, on the agency's budget. The subcommittee's chairman, Patrick Leahy, a Democrat, is the senator who called the project "dumb, dumb, dumb" during an appearance Thursday on MSNBC.The administration said early Thursday that it had disclosed the initiative to Congress — Carney said the program had been "debated in Congress" — but hours later the narrative had shifted to say that the administration had offered to discuss funding for it with the congressional committees that approve federal programs and budgets."We also offered to brief our appropriators and our authorizers," said State Department spokeswoman Marie Harf. She added that she was hearing on Capitol Hill that many people support these kinds of democracy promotion programs. And some lawmakers did speak up on that subject. But by late Thursday no members of Congress had acknowledged being aware of the Cuban Twitter program earlier than this week.
  • Harf described the program as "discreet" but said it was in no way classified or covert. Harf also said the project, dubbed ZunZuneo, did not rise to a level that required the secretary of state to be notified. Neither former Secretary of State Hillary Rodham Clinton nor John Kerry, the current occupant of the office, was aware of ZunZuneo, she said.In his prior position as chairman of the Senate Foreign Relations Committee, Kerry had asked congressional investigators to examine whether or not U.S. democracy promotion programs in Cuba were operated according to U.S. laws, among other issues. The resulting report, released by the Government Accountability Office in January 2013, does not examine whether or not the programs were covert. It does not say that any U.S. laws were broken.The GAO report does not specifically refer to ZunZuneo, but does note that USAID programs included "support for the development of independent social networking platforms."
  • "I know they said we were notified," Leahy told AP. "We were notified in the most oblique way, that nobody could understand it. I'm going to ask two basic questions: Why weren't we specifically told about this if you're asking us for money? And secondly, whose bright idea was this anyway?"The Republican chairman of a House oversight subcommittee said his panel will be looking into the project, too."That is not what USAID should be doing," said Rep. Jason Chaffetz, the Republican chairman of the House Oversight and Government Reform National Security Subcommittee. "USAID is flying the American flag and should be recognized around the globe as an honest broker of doing good. If they start participating in covert, subversive activities, the credibility of the United States is diminished."
  • At minimum, details uncovered by the AP appear to muddy the USAID's longstanding claims that it does not conduct covert actions, and the details could undermine the agency's mission to deliver aid to the world's poor and vulnerable — an effort that requires the trust and cooperation of foreign governments.Leahy and Rep. C.A. Dutch Ruppersberger, the top Democrat on the House Intelligence Committee, said they were unaware of ZunZuneo.
  • USAID and its contractors went to extensive lengths to conceal Washington's ties to the project, according to interviews and documents obtained by the AP. They set up front companies in Spain and the Cayman Islands to hide the money trail, and recruited CEOs without telling them they would be working on a U.S. taxpayer-funded project."There will be absolutely no mention of United States government involvement," according to a 2010 memo from Mobile Accord Inc., one of the project's creators. "This is absolutely crucial for the long-term success of the service and to ensure the success of the Mission."ZunZuneo was publicly launched shortly after the 2009 arrest in Cuba of American contractor Alan Gross. He was imprisoned after traveling repeatedly to the country on a separate, clandestine USAID mission to expand Internet access using sensitive technology that only governments use.The AP obtained more than 1,000 pages of documents about the ZunZuneo project's development. It independently verified the project's scope and details in the documents through publicly available databases, government sources and interviews with those involved.
  • The social media project began after Washington-based Creative Associates International obtained a half-million Cuban cellphone numbers. It was unclear to the AP how the numbers were obtained, although documents indicate they were done so illicitly from a key source inside the country's state-run provider. Project organizers used those numbers to start a subscriber base.ZunZuneo's organizers wanted the social network to grow slowly to avoid detection by the Cuban government. Eventually, documents and interviews reveal, they hoped the network would reach critical mass so that dissidents could organize "smart mobs" — mass gatherings called at a moment's notice — that could trigger political demonstrations, or "renegotiate the balance of power between the state and society."At a 2011 speech at George Washington University, Clinton said the U.S. helps people in "oppressive Internet environments get around filters." Noting Tunisia's role in the Arab Spring, she said people used technology to help "fuel a movement that led to revolutionary change."Suzanne Hall, then a State Department official working on Clinton's social media efforts, helped spearhead an attempt to get Twitter founder Jack Dorsey to take over the ZunZuneo project, documents indicate. Dorsey declined to comment.
  • The estimated $1.6 million spent on ZunZuneo was publicly earmarked for an unspecified project in Pakistan, public government data show, but those documents don't reveal where the funds were actually spent.ZunZuneo's organizers worked hard to create a network that looked like a legitimate business, including the creation of a companion website — and marketing campaign — so users could subscribe and send their own text messages to groups of their choice."Mock ad banners will give it the appearance of a commercial enterprise," one written proposal obtained by the AP said. Behind the scenes, ZunZuneo's computers were also storing and analyzing subscribers' messages and other demographic information, including gender, age, "receptiveness" and "political tendencies." USAID believed the demographics on dissent could help it target its other Cuba programs and "maximize our possibilities to extend our reach."
  • Executives set up a corporation in Spain and an operating company in the Cayman Islands — a well-known British offshore tax haven — to pay the company's bills so the "money trail will not trace back to America," a strategy memo said. Disclosure of that connection would have been a catastrophic blow, they concluded, because it would undermine the service's credibility with subscribers and get it shut down by the Cuban government.Similarly, subscribers' messages were funneled through two other countries — and never through American-based computer servers.Denver-based Mobile Accord considered at least a dozen candidates to head the European front company. One candidate, Francoise de Valera, told the AP she was told nothing about Cuba or U.S. involvement.
  • James Eberhard, Mobile Accord's CEO and a key player in the project's development, declined to comment. Creative Associates referred questions to USAID.For more than two years, ZunZuneo grew, reaching at least 40,000 subscribers. But documents reveal the team found evidence Cuban officials tried to trace the text messages and break into the ZunZuneo system. USAID told the AP that ZunZuneo stopped in September 2012 when a government grant ended.
  •  
    More coming related to this story.
Paul Merrell

S.J.Res.19 - 113th Congress (2013-2014): A joint resolution proposing an amendment to t... - 0 views

  • S.J.Res.19 - A joint resolution proposing an amendment to the Constitution of the United States relating to contributions and expenditures intended to affect elections.
  • 06/18/2014 Committee on the Judiciary Subcommittee on the Constitution, Civil Rights and Human Rights. Approved for full committee consideration with an amendment in the nature of a substitute favorably.
  •  
    A joint resolution to reform campaign finance has been favorably reported out of subcommittee favorably by a subcommittee with an amendment by way of a substitute. The resolution is in the nature of a proposed amendment to the Constitution to overcome Supreme Court precedents allowing virtually unlimited campaign contributions. The substitute amendment is at http://cl.ly/0O3l3w382n2M The substitute, offered by Sen. Durbin, is the result of intense lobbying by Move to Amend, a citizen campaign to pass an amendment that would not only reform campaign spending but also abolish all constitutional rights for corporations. That  campaign has successfull resolutions in support by several states and hundreds of cities. See https://movetoamend.org/ The original senate resolution by Senator Udall was an effort to get out in front of that citizen effort with an extremely watered down version that did not address corporate personhood.   Sen. Durbin's substitute amendment does not go as far as to abolish all constitutional rights of corporations but does provide in section 2 that "Congress  and  the  States  shall  have power to implement and enforce this article by appropriate legislation,  and  may  distinguish  between  natural persons and corporations or other artificial entities created by law, including  by  prohibiting  such  entities  from  spending money to influence elections." Motion to Amend ain't buying it. There in it for the long haul, aiming to pass their amendment by 2030. For the text of their amendment, which has been introduced in the House, see https://movetoamend.org/wethepeopleamendment   
Paul Merrell

Irish court peels off gloves, hands Facebook PROBE request to ECJ * The Register - 0 views

  • The High Court in Ireland has referred a review of a complaint against Facebook to Europe's top court. The complaint alleges the social network shared EU users' data with the US National Security Agency.The European Court of Justice is to assess whether EU law needs to be updated in light of the PRISM revelations, which could have a knock-on effect on tech firms from Facebook to Google. <a href="http://pubads.g.doubleclick.net/gampad/jump?iu=/6978/reg_policy/government&sz=300x250%7C300x600&tile=3&c=33U6KvJawQrMoAAAUTy6EAAAJ5&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" target="_blank"> <img src="http://pubads.g.doubleclick.net/gampad/ad?iu=/6978/reg_policy/government&sz=300x250%7C300x600&tile=3&c=33U6KvJawQrMoAAAUTy6EAAAJ5&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" alt=""></a> Austrian law student Maximillian Schrems took Facebook to court in Ireland, where the social network’s European HQ is located, over the revelations from NSA whistleblower Edward Snowden that personal data held by tech firms like Facebook was routinely being slurped by US spooks.
  • Schrems first asked the Irish Data Commissioner to investigate the legality of Facebook Ireland sending his info over to the States, where it could be seen by the security services, but when the commissioner refused to investigate, he sought a judicial review at the High Court.The Commissioner had ruled that Schrems didn’t have a case because he couldn’t prove that anyone had slurped his data in particular and anyway, the EU has an agreement with the US under the “Safe Harbour” principle decided way back in 2000. This principle governs data flow from Europe to United States and allows US firms to self-certify themselves as respectful of European data protection rules.High Court Justice Gerard Hogan said Schrems did not need to prove that his own data had been spied upon to make a complaint.“Quite obviously, Mr Schrems cannot say whether his own personal data has ever been accessed or whether it would ever be accessed by the US authorities,” he wrote in his ruling.
  • “But even if this were considered to be unlikely, he is nonetheless certainly entitled to object to a state of affairs where his data are transferred to a jurisdiction which, to all intents and purposes, appears to provide only a limited protection against any interference with that private data by the US security authorities.”However, he said that only the European Court of Justice could decide that individual member states were allowed to look past the Safe Harbour principle or reinterpret its meaning. Hogan said that Schrems, who had filed on behalf of the Europe-v-Facebook group, really had a problem with this principle and acknowledged that there may be an argument for the idea that the rule was outdated.“The Safe Harbour Regime… may reflect a somewhat more innocent age in terms of data protection,” he said. “This Regime came into force prior to the advent of social media and, of course, before the massive terrorist attacks on American soil which took place on September 11th, 2001.”
  • ...2 more annotations...
  • Hogan also admitted that the PRISM programme of surveillance was wrong by the letter of Irish law, which protects people’s data and the inviolability of their homes.“It is very difficult to see how the mass and undifferentiated accessing by state authorities of personal data generated perhaps especially with the home… could survive constitutional scrutiny,” he said.“The potential for abuse in such cases would be enormous and might even give rise to the possibility that no facet of private or domestic life with the home would be immune from potential state scrutiny.“Such a state of affairs – with its gloomy echoes of the mass state surveillance programmes conducted in totalitarian states such as the German Democratic Republic of Ulbricht and Honecker – would be totally at odds with the basic premises and fundamental values of the Constitution.”
  • However, he said that Irish law is pre-empted by EU law in this case and the Court of Justice needed to assess whether the interpretation of the Safe Harbour Regime needed to be re-evaluated.Any verdict from the European court will likely apply to all US companies that have participated in PRISM and operate in the region, Schrems said of the ruling.“We did not prepare for a direct reference to the ECJ, but this is the best outcome we could have wished for,” he said. “We will study the judgment in detail and will take the next steps as soon as possible.” ®
  •  
    If you're in the market to purchase a few cloud server farms located in the U.S., you may want to hold off until the EU Court of Justice rules. Prices could be tumbling shortly afterward.  In related news, Reps. Zoe Lofgren and Thomas Massie have introduced a bipartisan amendment to the annual Department of Defense Appropriations bill (H.R. 4870) that would prohibit use of the bill's funds to: 1) Conduct warrantless searches of Americans' communications collected and stored by the NSA under Section 702 of the FISA Amendments Act. 2) Mandate or request that backdoors for surveillance be built into products or services, except those covered under the Communications Assistance for Law Enforcement Act.
Paul Merrell

CURIA - Documents - 0 views

  • 37      It must be stated that the interference caused by Directive 2006/24 with the fundamental rights laid down in Articles 7 and 8 of the Charter is, as the Advocate General has also pointed out, in particular, in paragraphs 77 and 80 of his Opinion, wide-ranging, and it must be considered to be particularly serious. Furthermore, as the Advocate General has pointed out in paragraphs 52 and 72 of his Opinion, the fact that data are retained and subsequently used without the subscriber or registered user being informed is likely to generate in the minds of the persons concerned the feeling that their private lives are the subject of constant surveillance.
  • 43      In this respect, it is apparent from recital 7 in the preamble to Directive 2006/24 that, because of the significant growth in the possibilities afforded by electronic communications, the Justice and Home Affairs Council of 19 December 2002 concluded that data relating to the use of electronic communications are particularly important and therefore a valuable tool in the prevention of offences and the fight against crime, in particular organised crime. 44      It must therefore be held that the retention of data for the purpose of allowing the competent national authorities to have possible access to those data, as required by Directive 2006/24, genuinely satisfies an objective of general interest.45      In those circumstances, it is necessary to verify the proportionality of the interference found to exist.46      In that regard, according to the settled case-law of the Court, the principle of proportionality requires that acts of the EU institutions be appropriate for attaining the legitimate objectives pursued by the legislation at issue and do not exceed the limits of what is appropriate and necessary in order to achieve those objectives (see, to that effect, Case C‑343/09 Afton Chemical EU:C:2010:419, paragraph 45; Volker und Markus Schecke and Eifert EU:C:2010:662, paragraph 74; Cases C‑581/10 and C‑629/10 Nelson and Others EU:C:2012:657, paragraph 71; Case C‑283/11 Sky Österreich EU:C:2013:28, paragraph 50; and Case C‑101/12 Schaible EU:C:2013:661, paragraph 29).
  • 67      Article 7 of Directive 2006/24, read in conjunction with Article 4(1) of Directive 2002/58 and the second subparagraph of Article 17(1) of Directive 95/46, does not ensure that a particularly high level of protection and security is applied by those providers by means of technical and organisational measures, but permits those providers in particular to have regard to economic considerations when determining the level of security which they apply, as regards the costs of implementing security measures. In particular, Directive 2006/24 does not ensure the irreversible destruction of the data at the end of the data retention period.68      In the second place, it should be added that that directive does not require the data in question to be retained within the European Union, with the result that it cannot be held that the control, explicitly required by Article 8(3) of the Charter, by an independent authority of compliance with the requirements of protection and security, as referred to in the two previous paragraphs, is fully ensured. Such a control, carried out on the basis of EU law, is an essential component of the protection of individuals with regard to the processing of personal data (see, to that effect, Case C‑614/10 Commission v Austria EU:C:2012:631, paragraph 37).69      Having regard to all the foregoing considerations, it must be held that, by adopting Directive 2006/24, the EU legislature has exceeded the limits imposed by compliance with the principle of proportionality in the light of Articles 7, 8 and 52(1) of the Charter.
  • ...13 more annotations...
  • 58      Directive 2006/24 affects, in a comprehensive manner, all persons using electronic communications services, but without the persons whose data are retained being, even indirectly, in a situation which is liable to give rise to criminal prosecutions. It therefore applies even to persons for whom there is no evidence capable of suggesting that their conduct might have a link, even an indirect or remote one, with serious crime. Furthermore, it does not provide for any exception, with the result that it applies even to persons whose communications are subject, according to rules of national law, to the obligation of professional secrecy. 59      Moreover, whilst seeking to contribute to the fight against serious crime, Directive 2006/24 does not require any relationship between the data whose retention is provided for and a threat to public security and, in particular, it is not restricted to a retention in relation (i) to data pertaining to a particular time period and/or a particular geographical zone and/or to a circle of particular persons likely to be involved, in one way or another, in a serious crime, or (ii) to persons who could, for other reasons, contribute, by the retention of their data, to the prevention, detection or prosecution of serious offences.
  • 1        These requests for a preliminary ruling concern the validity of Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC (OJ 2006 L 105, p. 54).
  • Digital Rights Ireland Ltd (C‑293/12)vMinister for Communications, Marine and Natural Resources,Minister for Justice, Equality and Law Reform,Commissioner of the Garda Síochána,Ireland,The Attorney General,intervener:Irish Human Rights Commission, andKärntner Landesregierung (C‑594/12),Michael Seitlinger,Christof Tschohl and others,
  • JUDGMENT OF THE COURT (Grand Chamber)8 April 2014 (*)(Electronic communications — Directive 2006/24/EC — Publicly available electronic communications services or public communications networks services — Retention of data generated or processed in connection with the provision of such services — Validity — Articles 7, 8 and 11 of the Charter of Fundamental Rights of the European Union)In Joined Cases C‑293/12 and C‑594/12,
  • 34      As a result, the obligation imposed by Articles 3 and 6 of Directive 2006/24 on providers of publicly available electronic communications services or of public communications networks to retain, for a certain period, data relating to a person’s private life and to his communications, such as those referred to in Article 5 of the directive, constitutes in itself an interference with the rights guaranteed by Article 7 of the Charter. 35      Furthermore, the access of the competent national authorities to the data constitutes a further interference with that fundamental right (see, as regards Article 8 of the ECHR, Eur. Court H.R., Leander v. Sweden, 26 March 1987, § 48, Series A no 116; Rotaru v. Romania [GC], no. 28341/95, § 46, ECHR 2000-V; and Weber and Saravia v. Germany (dec.), no. 54934/00, § 79, ECHR 2006-XI). Accordingly, Articles 4 and 8 of Directive 2006/24 laying down rules relating to the access of the competent national authorities to the data also constitute an interference with the rights guaranteed by Article 7 of the Charter. 36      Likewise, Directive 2006/24 constitutes an interference with the fundamental right to the protection of personal data guaranteed by Article 8 of the Charter because it provides for the processing of personal data.
  • 65      It follows from the above that Directive 2006/24 does not lay down clear and precise rules governing the extent of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter. It must therefore be held that Directive 2006/24 entails a wide-ranging and particularly serious interference with those fundamental rights in the legal order of the EU, without such an interference being precisely circumscribed by provisions to ensure that it is actually limited to what is strictly necessary.66      Moreover, as far as concerns the rules relating to the security and protection of data retained by providers of publicly available electronic communications services or of public communications networks, it must be held that Directive 2006/24 does not provide for sufficient safeguards, as required by Article 8 of the Charter, to ensure effective protection of the data retained against the risk of abuse and against any unlawful access and use of that data. In the first place, Article 7 of Directive 2006/24 does not lay down rules which are specific and adapted to (i) the vast quantity of data whose retention is required by that directive, (ii) the sensitive nature of that data and (iii) the risk of unlawful access to that data, rules which would serve, in particular, to govern the protection and security of the data in question in a clear and strict manner in order to ensure their full integrity and confidentiality. Furthermore, a specific obligation on Member States to establish such rules has also not been laid down.
  • 60      Secondly, not only is there a general absence of limits in Directive 2006/24 but Directive 2006/24 also fails to lay down any objective criterion by which to determine the limits of the access of the competent national authorities to the data and their subsequent use for the purposes of prevention, detection or criminal prosecutions concerning offences that, in view of the extent and seriousness of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter, may be considered to be sufficiently serious to justify such an interference. On the contrary, Directive 2006/24 simply refers, in Article 1(1), in a general manner to serious crime, as defined by each Member State in its national law.61      Furthermore, Directive 2006/24 does not contain substantive and procedural conditions relating to the access of the competent national authorities to the data and to their subsequent use. Article 4 of the directive, which governs the access of those authorities to the data retained, does not expressly provide that that access and the subsequent use of the data in question must be strictly restricted to the purpose of preventing and detecting precisely defined serious offences or of conducting criminal prosecutions relating thereto; it merely provides that each Member State is to define the procedures to be followed and the conditions to be fulfilled in order to gain access to the retained data in accordance with necessity and proportionality requirements.
  • 55      The need for such safeguards is all the greater where, as laid down in Directive 2006/24, personal data are subjected to automatic processing and where there is a significant risk of unlawful access to those data (see, by analogy, as regards Article 8 of the ECHR, S. and Marper v. the United Kingdom, § 103, and M. K. v. France, 18 April 2013, no. 19522/09, § 35).56      As for the question of whether the interference caused by Directive 2006/24 is limited to what is strictly necessary, it should be observed that, in accordance with Article 3 read in conjunction with Article 5(1) of that directive, the directive requires the retention of all traffic data concerning fixed telephony, mobile telephony, Internet access, Internet e-mail and Internet telephony. It therefore applies to all means of electronic communication, the use of which is very widespread and of growing importance in people’s everyday lives. Furthermore, in accordance with Article 3 of Directive 2006/24, the directive covers all subscribers and registered users. It therefore entails an interference with the fundamental rights of practically the entire European population. 57      In this respect, it must be noted, first, that Directive 2006/24 covers, in a generalised manner, all persons and all means of electronic communication as well as all traffic data without any differentiation, limitation or exception being made in the light of the objective of fighting against serious crime.
  • 62      In particular, Directive 2006/24 does not lay down any objective criterion by which the number of persons authorised to access and subsequently use the data retained is limited to what is strictly necessary in the light of the objective pursued. Above all, the access by the competent national authorities to the data retained is not made dependent on a prior review carried out by a court or by an independent administrative body whose decision seeks to limit access to the data and their use to what is strictly necessary for the purpose of attaining the objective pursued and which intervenes following a reasoned request of those authorities submitted within the framework of procedures of prevention, detection or criminal prosecutions. Nor does it lay down a specific obligation on Member States designed to establish such limits. 63      Thirdly, so far as concerns the data retention period, Article 6 of Directive 2006/24 requires that those data be retained for a period of at least six months, without any distinction being made between the categories of data set out in Article 5 of that directive on the basis of their possible usefulness for the purposes of the objective pursued or according to the persons concerned.64      Furthermore, that period is set at between a minimum of 6 months and a maximum of 24 months, but it is not stated that the determination of the period of retention must be based on objective criteria in order to ensure that it is limited to what is strictly necessary.
  • 52      So far as concerns the right to respect for private life, the protection of that fundamental right requires, according to the Court’s settled case-law, in any event, that derogations and limitations in relation to the protection of personal data must apply only in so far as is strictly necessary (Case C‑473/12 IPI EU:C:2013:715, paragraph 39 and the case-law cited).53      In that regard, it should be noted that the protection of personal data resulting from the explicit obligation laid down in Article 8(1) of the Charter is especially important for the right to respect for private life enshrined in Article 7 of the Charter.54      Consequently, the EU legislation in question must lay down clear and precise rules governing the scope and application of the measure in question and imposing minimum safeguards so that the persons whose data have been retained have sufficient guarantees to effectively protect their personal data against the risk of abuse and against any unlawful access and use of that data (see, by analogy, as regards Article 8 of the ECHR, Eur. Court H.R., Liberty and Others v. the United Kingdom, 1 July 2008, no. 58243/00, § 62 and 63; Rotaru v. Romania, § 57 to 59, and S. and Marper v. the United Kingdom, § 99).
  • 26      In that regard, it should be observed that the data which providers of publicly available electronic communications services or of public communications networks must retain, pursuant to Articles 3 and 5 of Directive 2006/24, include data necessary to trace and identify the source of a communication and its destination, to identify the date, time, duration and type of a communication, to identify users’ communication equipment, and to identify the location of mobile communication equipment, data which consist, inter alia, of the name and address of the subscriber or registered user, the calling telephone number, the number called and an IP address for Internet services. Those data make it possible, in particular, to know the identity of the person with whom a subscriber or registered user has communicated and by what means, and to identify the time of the communication as well as the place from which that communication took place. They also make it possible to know the frequency of the communications of the subscriber or registered user with certain persons during a given period. 27      Those data, taken as a whole, may allow very precise conclusions to be drawn concerning the private lives of the persons whose data has been retained, such as the habits of everyday life, permanent or temporary places of residence, daily or other movements, the activities carried out, the social relationships of those persons and the social environments frequented by them.
  • 32      By requiring the retention of the data listed in Article 5(1) of Directive 2006/24 and by allowing the competent national authorities to access those data, Directive 2006/24, as the Advocate General has pointed out, in particular, in paragraphs 39 and 40 of his Opinion, derogates from the system of protection of the right to privacy established by Directives 95/46 and 2002/58 with regard to the processing of personal data in the electronic communications sector, directives which provided for the confidentiality of communications and of traffic data as well as the obligation to erase or make those data anonymous where they are no longer needed for the purpose of the transmission of a communication, unless they are necessary for billing purposes and only for as long as so necessary.
  • On those grounds, the Court (Grand Chamber) hereby rules:Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC is invalid.
  •  
    EU Court of Justice decision in regard to a Directive that required communications data retention by telcos/ISPs, finding the Directive invalid as a violation of the right of privacy in communications. Fairly read, paragraph 59 outlaws bulk collection of such records, i.e., it requires the equivalent of a judge-issued search warrant in the U.S. based on probable cause to believe that the particular individual's communications are a legitimate object of a search.  Note also that paragraph 67 effectively forbids transfer of any retained data outside the E.U. So a barrier for NSA sharing of data with GCHQ derived from communications NSA collects from EU communications traffic. Bye-bye, Big Data for GCHQ in the E.U. 
Paul Merrell

Establish "No Spy Zones"? Current Law Could Make It Hard - Secrecy News - 0 views

  • Disclosure of U.S. intelligence surveillance activities in Germany and other allied countries has aroused angry public reaction in those countries, and has prompted discussion of the possibility of negotiating “no spy zones” abroad in which certain types of intelligence collection would be renounced and prohibited. Some have spoken of extending to Germany or other countries the “Five Eyes” agreement that has long existed among the US, the UK, Canada, Australia and New Zealand to share intelligence, and not to spy on each other. But a rarely-noted statute could make it difficult for any U.S. administration to achieve an international agreement involving binding new limits on intelligence collection against a foreign country, unless Congress enacts the limitation itself.
  • In the FY 2001 intelligence authorization act (P.L. 106-567, sect. 308), Congress said that the imperatives of U.S. intelligence gathering are to be understood to take precedence over any treaty or international agreement: “No Federal law enacted on or after the date of the enactment of the Intelligence Authorization Act for Fiscal Year 2001 that implements a treaty or other international agreement shall be construed as making unlawful an otherwise lawful and authorized intelligence activity of the United States Government or its employees, or any other person to the extent such other person is carrying out such activity on behalf of, and at the direction of, the United States, unless such Federal law specifically addresses such intelligence activity.” By way of explanation, the Senate Intelligence Committee said in a 2000 report:  “There has been a concern that future legislation implementing international agreements could be interpreted…. as restricting intelligence activities that are otherwise entirely consistent with U.S. law and policy.” At a minimum, this provision appears to complicate any such restriction on intelligence activities that is advanced by international agreement, unless it is explicitly affirmed by Congress itself.
  •  
    The quoted passage include a link to the public law version of the quoted statute, which includes a definition of "authorized intelligence activities" and a reference indicating the law was codified at 50 U.S.C. 442. But it ain't there in the LII Cornell online version of the Code or in the Senate's online version. The Senate version has a reference saying that it was editorially transferred to another location in a Title dealing with disposal of government records. But the referenced sections do not exist there. So a trip to the law library to check the printed version and Westlaw. At this point I cannot confirm that the statute is still in force. But this is a great example of the evils of tucking substantive legislation into appropriation and other "Christmas Tree" bills. Oregon has a state constitutional provision limiting legislative enactments to a single subject. It's been used as authority by Oregon courts to void legislation on many occasions. But good luck trying to get the federal constitution amended to add a similar limitation.   
Paul Merrell

Top Stories - If Terrorist Attacks are on the Rise, What Does that Say about the 13-Yea... - 0 views

  • The phrase “war on terror” was first used shortly after the September 11, 2001, attacks by then-President George W. Bush. More recently, President Barack Obama declared in 2013 that he’s no longer pursuing the war on terror in favor of “a series of persistent, targeted efforts to dismantle specific networks of violent extremists that threaten America.” But regardless of whether the United States claims to be in such a war, terror attacks continue to increase. The most recent figures from the State Department show that there was a sharp increase in terror attacks worldwide in 2014 over the numbers from the previous year. According to its figures, attacks increased 35% and fatalities jumped 81% over 2013’s numbers, with the increase coming mainly in Iraq, Afghanistan and Nigeria. Part of the reason for the huge increase in fatalities was the jump in large-scale attacks, those killing more than 100 people. There were 20 such attacks in 2014, compared to two in 2013. There were a total of 13,463 terrorist attacks last year. The month of May, when fighting in Afghanistan heats up with the weather, had the most with 1,338.
  • Those aren’t the only metrics available on the war on terror, of course. Another is how much money has been spent. A report (pdf) from the Congressional Research Service (CRS) says that $1.6 trillion has gone into U.S. war efforts since 9/11. That includes “military operations, base support, weapons maintenance, training of Afghan and Iraq security forces, reconstruction, foreign aid, embassy costs, and veterans’ health care for the war operations initiated since the 9/11 attacks,” according to the report. That spending continues to grow. Those numbers don’t include money appropriated since the Consolidated Appropriations Act for fiscal year 2014. CRS’s dollar figure is stunning on its own. But the Costs of War project, a nonpartisan, nonprofit, scholarly initiative based at Brown University’s Watson Institute for International and Public Affairs, came up with even more eye-popping numbers. They put the cost of the post-9/11 fighting at $4.4 trillion. In addition to the costs of bullets and bandages, they included the interest on the money borrowed to fight the war (remember—Bush sought no tax increases to fund the fighting); the money it took out of the economy and cost Americans in increased interest; the future cost of treating and healing wounded veterans (expected to peak in 30 or 40 years at more than $1 trillion); and increased homeland security spending.
  • Interest payments on the money borrowed to pay for the war on terror will continue far into the future and are expected to be astronomical as well: $1 trillion by 2023, or more than $7 trillion by 2053. The Costs of War also looked at what the war on terror cost in terms of lost opportunities; that is, what the money could have been spent on instead of the military, such as domestic infrastructure and non-military job creation.
  • ...1 more annotation...
  • The phrase “war on terror” was first used shortly after the September 11, 2001, attacks by then-President George W. Bush. More recently, President Barack Obama declared in 2013 that he’s no longer pursuing the war on terror in favor of “a series of persistent, targeted efforts to dismantle specific networks of violent extremists that threaten America.” But regardless of whether the United States claims to be in such a war, terror attacks continue to increase.
  •  
    Yes, Virginia. We have lost the War on Terror and the piper must be paid. 
Paul Merrell

Mission Failure Admission: US Abandons Program To Train Syrian Rebels - 0 views

  • The U.S. Pentagon is expected to announce Friday that it will end its oft-criticized $500 million program to train and equip Syrian rebels, offering further evidence of the Obama administration’s incoherent and failed strategy in Syria and beyond. According to the New York Times, which broke the news, Pentagon officials will officially announce the end of the program on Friday, as Defense Secretary Ashton B. Carter leaves London after meetings with his British counterpart, Defense Minister Michael Fallon, about the continuing wars in Syria and Iraq. “A senior Defense Department official, who was not authorized to speak publicly and who spoke on the condition of anonymity, said that there would no longer be any more recruiting of so-called moderate Syrian rebels to go through training programs in Jordan, Qatar, Saudi Arabia or the United Arab Emirates,” the Times reports. “Instead, a much smaller training center would be set up in Turkey, where a small group of ‘enablers’— mostly leaders of opposition groups—would be taught operational maneuvers like how to call in airstrikes.” The program had been criticized from the beginning, with many charging that the strategy would merely lead to deeper chaos and regional instability—all while being based on mistaken assumptions.
  • “The proposition that there is a moderate Syrian opposition with enough military potential and—even more importantly—popular support inside Syria to overthrow the Assad government is a myth,” foreign policy experts Flynt Leverett and Hillary Mann Leverett wrote for Consortium News one year ago. “To claim in addition that these mythical moderate oppositionists can take on and defeat the Islamic State is either blatantly dishonest or dangerously delusional.” And just last month, journalist Robert Parry described the program as “an embarrassing failure, producing only about 50 fighters who then were quickly killed or captured by Al Qaeda’s Nusra and other jihadist groups, leaving only ‘four or five’ trainees from the program, according to Gen. Lloyd J. Austin III, head of the U.S. Central Command which has responsibility for the Middle East.”
  • As Common Dreams reported at the time, Central Command admitted in September that the U.S.-trained and armed rebels at the center of the policy had turned over at least a quarter of their American-issued equipment to the al Nusra Front, which is linked with al Qaeda.
  •  
    Congress, of course, just appropriated $600 million to expand the same program. 
Gary Edwards

Higher Taxes are Coming. Head for Your Bunkers. | Mogambo Guru - 0 views

  •  
    Then numbers are staggering: excerpt: Well, if there is such a thing as the hypothetical "rational economic man," then this "sell everything!" scenario is exactly what will happen because taxes of all kinds, including the all-important income taxes and capital gains taxes, are going to all go up by - hold onto your hats! - almost a third or more next year! Right now, the marginal income tax rates are 10%, 15%, 25%, 28%, 33% and 35%, which is the range of six different tax rates for the few people that make enough money to actually pay any federal income taxes, which seems like such a quaint anachronism these days because more people receive money from the government than people who pay the government, which explains why the budget deficit this year - alone! - is $1.4 trillion or so, and when including the inevitable supplemental appropriations throughout the year, will surely be near staggering $2 trillion, bringing total federal government spending to almost $5 trillion, whereas all the business and personal income taxes collected for the whole year is less than $1.5 trillion!
Gary Edwards

Bradley Schiller Says Barack Obama Should Stop Comparing Our Financial Crisis With the ... - 0 views

  •  
    This out of control Obama fearmongering may be good politics, but it is bad history and bad economics. It is bad history because our current economic woes don't come close to those of the 1930s. At worst, a comparison to the 1981-82 recession might be appropriate. Consider the job losses that Mr. Obama always cites. In the last year, the U.S. economy shed 3.4 million jobs. That's a grim statistic for sure, but represents just 2.2% of the labor force. From November 1981 to October 1982, 2.4 million jobs were lost -- fewer in number than today, but the labor force was smaller. So 1981-82 job losses totaled 2.2% of the labor force, the same as now. Good stats comparing the Roosevelt great depression years, the Carter recession years and the Obama recession years.
Gary Edwards

Bailouts Of Bondholders Will Sock Taxpayers With $10-$14 Trillion Loss - 0 views

  •  
    The holders [of this debt] are not just banks, but insurance companies, pension funds, foreign lenders, and others. Even so, there is no way to prevent huge, ongoing losses, because the cash flows off of these assets are not sufficient to service the debt. The only question is whether the bondholders appropriately bear those losses, or whether the public bears them inappropriately. A continued policy of protecting all of these bondholders would eventually require U.S. citizens to be put on the hook for something on the order of $10-14 trillion. We are nowhere near the end of this process. We simply cannot make these bad investments whole unless we are willing to hand the next 10-20 years of U.S. private savings over to the bondholders who financed reckless lending.
Gary Edwards

How Government Failure Caused the Great Recession - The American, A Magazine of Ideas - 0 views

  •  
    The banking crisis that began in August 2007 shocked markets and precipitated the Great Recession. To fully explain the banking crisis, one must account for its timing, severity, and global impact. One must also confront a startling historical contrast. If we define "banking crisis" to mean bank failures and system losses exceeding 1 percent of a country's gross domestic product (GDP), we find that in the period 1875-1913, a period of marked expansion in international trade and capital flows comparable to the last three decades, there were only four banking crises worldwide.1 By contrast, in the period 1978-2009, a period of much more extensive bank regulation, central bank intervention, government protection of depositors and other bank creditors, and government control of mortgage markets, about 140 banking crises occurred worldwide. Of these, 20 were more severe than any crisis from the earlier period of 1875-1913, in terms of total bank losses as a percent of GDP. Leading financial economists such as Charles Calomiris have argued that a necessary condition for a banking crisis is government policy that distorts the micro-incentives of banks. Likewise, University of Chicago scholar Richard Posner has argued the banks that got into trouble during the recent crisis were simply taking "risks that seemed appropriate in the environment in which they found themselves."2 In the period 1978-2009, about 140 banking crises occurred worldwide. But then why didn't a banking crisis erupt sooner-say, in the recession years of 1990-1991 or 2001-2002? What changed in recent years that led to business risk-taking capable of wrecking the U.S. housing market and the U.S. banking system and other banking systems throughout the world? Further, why were prudent credit practices reasonably maintained in credit card and commercial mortgage securitization in recent years, but wholly abandoned in residential mortgage securitization?
‹ Previous 21 - 40 of 183 Next › Last »
Showing 20 items per page