Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged digital-money

Rss Feed Group items tagged

Paul Merrell

Time for the Nuclear Option: Raining Money on Main Street | WEB OF DEBT BLOG - 0 views

  • Predictions are that we will soon be seeing the “nuclear option” — central bank-created money injected directly into the real economy. All other options having failed, governments will be reduced to issuing money outright to cover budget deficits. So warns a September 18 article on ZeroHedge titled “It Begins: Australia’s Largest Investment Bank Just Said ‘Helicopter Money’ Is 12-18 Months Away.” Money reformers will say it’s about time. Virtually all money today is created as bank debt, but people can no longer take on more debt. The money supply has shrunk along with people’s ability to borrow new money into existence. Quantitative easing (QE) attempts to re-inflate the money supply by giving money to banks to create more debt, but that policy has failed. It’s time to try dropping some debt-free money on Main Street. The Zerohedge prediction is based on a release from Macqurie, Australia’s largest investment bank. It notes that GDP is contracting, deflationary pressures are accelerating, public and private sectors are not driving the velocity of money higher, and central bank injections of liquidity are losing their effectiveness. Current policies are not working. As a result:
  • There are several policies that could be and probably would be considered over the next 12-18 months. If private sector lacks confidence and visibility to raise velocity of money, then (arguably) public sector could. In other words, instead of acting via bond markets and banking sector, why shouldn’t public sector bypass markets altogether and inject stimulus directly into the ‘blood stream’? Whilst it might or might not be called QE, it would have a much stronger impact and unlike the last seven years, the recovery could actually mimic a conventional business cycle and investors would soon start discussing multiplier effects and positioning in areas of greatest investment.  Willem Buiter, chief global economist at Citigroup, is also recommending “helicopter money drops” to avoid an imminent global recession, stating: A global recession starting in 2016 led by China is now our Global Economics team’s main scenario. Uncertainty remains, but the likelihood of a timely and effective policy response seems to be diminishing. . . . Helicopter money drops in China, the euro area, the UK, and the U.S. and debt restructuring . . . can mitigate and, if implemented immediately, prevent a recession during the next two years without raising the risk of a deeper and longer recession later.
  • In the UK, something akin to a helicopter money drop was just put on the table by Jeremy Corbyn, the newly-elected Labor leader. He proposes to give the Bank of England a new mandate to upgrade the economy to invest in new large scale housing, energy, transport and digital projects. He calls it “quantitative easing for people instead of banks” (PQE). The investments would be made through a National Investment Bank set up to invest in new infrastructure and in the hi-tech innovative industries of the future. Australian blogger Prof. Bill Mitchell agrees that PQE is economically sound. But he says it should not be called “quantitative easing.” QE is just an asset swap – cash for federal securities or mortgage-backed securities on bank balance sheets. What Corbyn is proposing is actually Overt Money Financing (OMF) – injecting money directly into the economy. Mitchell acknowledges that OMF is a taboo concept in mainstream economics. Allegedly, this is because it would lead to hyperinflation. But the real reasons, he says, are that: It cuts out the private sector bond traders from their dose of corporate welfare which unlike other forms of welfare like sickness and unemployment benefits etc. has made the recipients rich in the extreme. . . . It takes away the ‘debt monkey’ that is used to clobber governments that seek to run larger fiscal deficits.
  • ...4 more annotations...
  • Tim Worstall, writing in the UK Register, objects to Corbyn’s PQE (or OMF) on the ground that it cannot be “sterilized” the way QE can. When inflation hits, the process cannot be reversed. If the money is spent on infrastructure, it will be out there circulating in the economy and will not be retrievable. Worstall writes: QE is designed to be temporary, . . . because once people’s spending rates recover we need a way of taking all that extra money out of the economy. So we do it by using printed money to buy bonds, which injects the money into the economy, and then sell those bonds back once we need to withdraw the money from the economy, and simply destroy the money we’ve raised. . . . If we don’t have any bonds to sell, it’s not clear how we can reduce [the money supply] if large-scale inflation hits.
  • The problem today, however, is not inflation but deflation of the money supply. Some consumer prices may be up, but this can happen although the money supply is shrinking. Food prices, for example, are up; but it’s because of increased costs, including drought in California, climate change, and mergers and acquisitions by big corporations that eliminate competition. Adding money to the economy will not drive up prices until demand is saturated and production has hit full capacity; and we’re a long way from full capacity now. Before that, increasing “demand” will increase “supply.” Producers will create more goods and services. Supply and demand will rise together and prices will remain stable. In the US, the output gap – the difference between actual output and potential output – is estimated at about $1 trillion annually. That means the money supply could be increased by at least $1 trillion annually without driving up prices.
  • If PQE does go beyond full productive capacity, the government does not need to rely on the central bank to pull the money back. It can do this with taxes. Just as loans increase the money supply and repaying them shrinks it again, so taxes and other payments to the government will shrink a money supply augmented with money issued by the government. Using 2012 figures (drawing from an earlier article by this author), the velocity of M1 (the coins, dollar bills and demand deposits spent by ordinary consumers) was then 7. That means M1 changed hands seven times during 2012 – from housewife to grocer to farmer, etc. Since each recipient owed taxes on this money, increasing M1 by one dollar increased the tax base by seven dollars. Total tax revenue as a percentage of GDP in 2012 was 24.3%. Extrapolating from those figures, $1.00 changing hands seven times could increase tax revenue by $7.00 x 24.3% = $1.70. That means the government could, in theory, get more back in taxes than it paid out. Even with some leakage in those figures and deductions for costs, all or most of the new money spent into the economy might be taxed back to the government. New money could be pumped out every year and the money supply would increase little if at all.
  • Besides taxes, other ways to get money back into the Treasury include closing tax loopholes, taxing the $21 trillion or more hidden in offshore tax havens, and setting up a system of public banks that would return the interest on loans to the government. Net interest collected by U.S. banks in 2014 was $423 billion. At its high in 2007, it was $725 billion. Thus there are many ways to recycle an issue of new money back to the government. The same money could be spent and collected back year after year, without creating price inflation or hyperinflating the money supply. This not only could be done; it needs to be done. Conventional monetary policy has failed. Central banks have exhausted their existing toolboxes and need to explore some innovative alternatives.
  •  
    Debt having failed as a method of money creation leads us back to the printing press method. But on whom are those helicopters to drop their new money? And how to we ensure that the banksters are not among them?
Gary Edwards

Reinventing Banking: From Russia to Iceland to Ecuador - 1 views

  • Global developments in finance and geopolitics are prompting a rethinking of the structure of banking and of the nature of money itself. Among other interesting news items: * In Russia, vulnerability to Western sanctions has led to proposals for a banking system that is not only independent of the West but is based on different design principles. * In Iceland, the booms and busts culminating in the banking crisis of 2008-09 have prompted lawmakers to consider a plan to remove the power to create money from private banks. * In Ireland, Iceland and the UK, a recession-induced shortage of local credit has prompted proposals for a system of public interest banks on the model of the Sparkassen of Germany. * In Ecuador, the central bank is responding to a shortage of US dollars (the official Ecuadorian currency) by issuing digital dollars through accounts to which everyone has access, effectively making it a bank of the people.
  • A major concern with stripping private banks of the power to create money as deposits when they make loans is that it will seriously reduce the availability of credit in an already sluggish economy. One solution is to make the banks, or some of them, public institutions. They would still be creating money when they made loans, but it would be as agents of the government; and the profits would be available for public use, on the model of the US Bank of North Dakota and the German Sparkassen (public savings banks). In Ireland, three political parties – Sinn Fein, the Green Party and Renua Ireland (a new party) — are now supporting initiatives for a network of local publicly-owned banks on the Sparkassen model. In the UK, the New Economy Foundation (NEF) is proposing that the failed Royal Bank of Scotland be transformed into a network of public interest banks on that model. And in Iceland, public banking is part of the platform of a new political party called the Dawn Party.
  • Particularly interesting is a proposal to provide targeted lending for businesses and industries by providing them with low-interest loans at 1-4 percent, financed through the central bank with quantitative easing (digital money creation). The proposal is to issue 20 trillion rubles for this purpose over a five year period. Using quantitative easing for economic development mirrors the proposal of UK Labour Leader Jeremy Corbin for “quantitative easing for people.”
  • ...8 more annotations...
  • William Engdahl concludes that Russia is in “a fascinating process of rethinking every aspect of her national economic survival because of the reality of the western attacks,” one that “could produce a very healthy transformation away from the deadly defects” of the current banking model.
  • Iceland’s Radical Money Plan Iceland, too, is looking at a radical transformation of its money system, after suffering the crushing boom/bust cycle of the private banking model that bankrupted its largest banks in 2008. According to a March 2015 article in the UK Telegraph: Iceland’s government is considering a revolutionary monetary proposal – removing the power of commercial banks to create money and handing it to the central bank. The proposal, which would be a turnaround in the history of modern finance, was part of a report written by a lawmaker from the ruling centrist Progress Party, Frosti Sigurjonsson, entitled “A better monetary system for Iceland”.
  • Under this “Sovereign Money” proposal, the country’s central bank would become the only creator of money. Banks would continue to manage accounts and payments and would serve as intermediaries between savers and lenders. The proposal is a variant of the Chicago Plan promoted by Kumhof and Benes of the IMF and the Positive Money group in the UK.
  • Ever since 2000, when Ecuador agreed to use the US dollar as its official legal tender, it has had to ship boatloads of paper dollars into the country just to conduct trade. In order to “seek efficiency in payment systems [and] to promote and contribute to the economic stability of the country,” the government of President Rafael Correa has therefore established the world’s first national digitally-issued currency.
  • Unlike Bitcoin and similar private crypto-currencies (which have been outlawed in the country), Ecuador’s dinero electronico is operated and backed by the government. The Ecuadorian digital currency is less like Bitcoin than like M-Pesa, a private mobile phone-based money transfer service started by Vodafone, which has generated a “mobile money” revolution in Kenya.
  • According to a National Assembly statement: Electronic money will stimulate the economy; it will be possible to attract more Ecuadorian citizens, especially those who do not have checking or savings accounts and credit cards alone. The electronic currency will be backed by the assets of the Central Bank of Ecuador.
  • That means there is no fear of the bank going bankrupt or of bank runs or bail-ins. Nor can the digital currency be devalued by speculative short selling. The government has declared that these are digital US dollars trading at 1 to 1 – take it or leave it – and the people are taking it. According to an October 2015 article titled “
  • Banking Moves into the 21st Century The catastrophic failures of the Western banking system mandate a new vision. These transformations, current and proposed, are constructive steps toward streamlining the banking system, eliminating the risks that have devastated individuals and governments, democratizing money, and promoting sustainable and prosperous economies.
  •  
    Excellent article on banking, lending, and currency reform initiatives.  Thanks to Marbux!
Gary Edwards

Jim Kunstler's 2014 Forecast - Burning Down The House | Zero Hedge - 0 views

  •  
    Incredible must read analysis. Take away: the world is going to go "medevil". It's the only way out of this mess. Since the zero hedge layout is so bad, i'm going to post as much of the article as Diigo will allow: Jim Kunstler's 2014 Forecast - Burning Down The House Submitted by Tyler Durden on 01/06/2014 19:36 -0500 Submitted by James H. Kunstler of Kunstler.com , Many of us in the Long Emergency crowd and like-minded brother-and-sisterhoods remain perplexed by the amazing stasis in our national life, despite the gathering tsunami of forces arrayed to rock our economy, our culture, and our politics. Nothing has yielded to these forces already in motion, so far. Nothing changes, nothing gives, yet. It's like being buried alive in Jell-O. It's embarrassing to appear so out-of-tune with the consensus, but we persevere like good soldiers in a just war. Paper and digital markets levitate, central banks pull out all the stops of their magical reality-tweaking machine to manipulate everything, accounting fraud pervades public and private enterprise, everything is mis-priced, all official statistics are lies of one kind or another, the regulating authorities sit on their hands, lost in raptures of online pornography (or dreams of future employment at Goldman Sachs), the news media sprinkles wishful-thinking propaganda about a mythical "recovery" and the "shale gas miracle" on a credulous public desperate to believe, the routine swindles of medicine get more cruel and blatant each month, a tiny cohort of financial vampire squids suck in all the nominal wealth of society, and everybody else is left whirling down the drain of posterity in a vortex of diminishing returns and scuttled expectations. Life in the USA is like living in a broken-down, cob-jobbed, vermin-infested house that needs to be gutted, disinfected, and rebuilt - with the hope that it might come out of the restoration process retaining the better qualities of our heritage.
Gary Edwards

CHILDREN KILLED OF KEVIN KRIM, CHIEF EXECUTIVE OF CNBC DIGITAL, AFTER RELEASING INFORMA... - 0 views

  •  
    Incredible article about the behind-the-scenes story of the nanny murder of two small children in NYC.   First, it's a staged murder meant to send a clear message to ALL media.  The children were the offspring of Kevin Krim, CEO of CNBC digital.  His website had published a story about the Spire Law Group suing an entire class of bigshot BANKSTERS for the theft of $43 TRILLION dollars of tax payer money.  Second, this involves the US Government.  The Spire allegation is that the Feds actively helped and assisted the Bankster theft. Third, the story describes the historical background of these Bankster hits, assassination and threats.  Although not covered in the article, Presidential assassinations in particular have an unmistakable link to Executive Orders that the Treasury print Silver Certificates that would compete against Bankster notes.  In one way or another, it's all about control of the money system.  This list of Presidents includes Jackson, Lincoln, Garfield, McKinley, Kennedy and Reagan. Original Press Release from the Spire Law Group:  ... http://goo.gl/ynV6O .... Wow! ................................... excerpt:: "On 10/25/2012 two corporate financial media bastions,  MarketWatch  (an affiliate of the Wall Street Journal) and CNBC, presented their readers with a bombshell.  In a too-good-to-be-true lawsuit, the top echelons of the USA's banking and civilian government had been sued for "racketeering and money laundering."  The suit requested "the return of $43 trillion to the United States Treasury."  Yes, you've read that right: 43 trillion-roughly 3 years worth of America's GDP or 3 times America's underestimate of its own national debt. The suit characterizes itself, according to these two corporate media tabloids, as the largest money laundering and racketeering lawsuit in United States History.  [It identifies] $43 trillion ($43,000,000,000,000.00) of laundered money by the 'Banksters' and their U.S. r
Gary Edwards

Why Bitcoin Matters | Marc Andreessen - 0 views

  • First, Bitcoin at its most fundamental level is a breakthrough in computer science – one that builds on 20 years of research into cryptographic currency, and 40 years of research in cryptography, by thousands of researchers around the world. Bitcoin is the first practical solution to a longstanding problem in computer science called the Byzantine Generals Problem. To quote from the original paper defining the B.G.P.: “[Imagine] a group of generals of the Byzantine army camped with their troops around an enemy city. Communicating only by messenger, the generals must agree upon a common battle plan. However, one or more of them may be traitors who will try to confuse the others. The problem is to find an algorithm to ensure that the loyal generals will reach agreement.” More generally, the B.G.P. poses the question of how to establish trust between otherwise unrelated parties over an untrusted network like the Internet.
  • The practical consequence of solving this problem is that Bitcoin gives us, for the first time, a way for one Internet user to transfer a unique piece of digital property to another Internet user, such that the transfer is guaranteed to be safe and secure, everyone knows that the transfer has taken place, and nobody can challenge the legitimacy of the transfer. The consequences of this breakthrough are hard to overstate. What kinds of digital property might be transferred in this way? Think about digital signatures, digital contracts, digital keys (to physical locks, or to online lockers), digital ownership of physical assets such as cars and houses, digital stocks and bonds … and digital money. All these are exchanged through a distributed network of trust that does not require or rely upon a central intermediary like a bank or broker. And all in a way where only the owner of an asset can send it, only the intended recipient can receive it, the asset can only exist in one place at a time, and everyone can validate transactions and ownership of all assets anytime they want.
  • How does this work?
  • ...5 more annotations...
  • Bitcoin is a digital bearer instrument. It is a way to exchange money or assets between parties with no pre-existing trust: A string of numbers is sent over email or text message in the simplest case. The sender doesn’t need to know or trust the receiver or vice versa. Related, there are no chargebacks – this is the part that is literally like cash – if you have the money or the asset, you can pay with it; if you don’t, you can’t. This is brand new. This has never existed in digital form before. Bitcoin is a digital currency, whose value is based directly on two things: use of the payment system today – volume and velocity of payments running through the ledger – and speculation on future use of the payment system. This is one part that is confusing people. It’s not as much that the Bitcoin currency has some arbitrary value and then people are trading with it; it’s more that people can trade with Bitcoin (anywhere, everywhere, with no fraud and no or very low fees) and as a result it has value.
  • Bitcoin is an Internet-wide distributed ledger. You buy into the ledger by purchasing one of a fixed number of slots, either with cash or by selling a product and service for Bitcoin. You sell out of the ledger by trading your Bitcoin to someone else who wants to buy into the ledger. Anyone in the world can buy into or sell out of the ledger any time they want – with no approval needed, and with no or very low fees. The Bitcoin “coins” themselves are simply slots in the ledger, analogous in some ways to seats on a stock exchange, except much more broadly applicable to real world transactions. The Bitcoin ledger is a new kind of payment system. Anyone in the world can pay anyone else in the world any amount of value of Bitcoin by simply transferring ownership of the corresponding slot in the ledger. Put value in, transfer it, the recipient gets value out, no authorization required, and in many cases, no fees. That last part is enormously important. Bitcoin is the first Internetwide payment system where transactions either happen with no fees or very low fees (down to fractions of pennies). Existing payment systems charge fees of about 2 to 3 percent – and that’s in the developed world. In lots of other places, there either are no modern payment systems or the rates are significantly higher. We’ll come back to that.
  • Why would any merchant – online or in the real world – want to accept Bitcoin as payment, given the currently small number of consumers who want to pay with it? My partner Chris Dixon recently gave this example: “Let’s say you sell electronics online. Profit margins in those businesses are usually under 5 percent, which means conventional 2.5 percent payment fees consume half the margin. That’s money that could be reinvested in the business, passed back to consumers or taxed by the government. Of all of those choices, handing 2.5 percent to banks to move bits around the Internet is the worst possible choice. Another challenge merchants have with payments is accepting international payments. If you are wondering why your favorite product or service isn’t available in your country, the answer is often payments.” In addition, merchants are highly attracted to Bitcoin because it eliminates the risk of credit card fraud. This is the form of fraud that motivates so many criminals to put so much work into stealing personal customer information and credit card numbers. Since Bitcoin is a digital bearer instrument, the receiver of a payment does not get any information from the sender that can be used to steal money from the sender in the future, either by that merchant or by a criminal who steals that information from the merchant.
  • What’s the future of Bitcoin?
  • Bitcoin is a classic network effect, a positive feedback loop. The more people who use Bitcoin, the more valuable Bitcoin is for everyone who uses it, and the higher the incentive for the next user to start using the technology. Bitcoin shares this network effect property with the telephone system, the web, and popular Internet services like eBay and Facebook. In fact, Bitcoin is a four-sided network effect. There are four constituencies that participate in expanding the value of Bitcoin as a consequence of their own self-interested participation. Those constituencies are (1) consumers who pay with Bitcoin, (2) merchants who accept Bitcoin, (3) “miners” who run the computers that process and validate all the transactions and enable the distributed trust network to exist, and (4) developers and entrepreneurs who are building new products and services with and on top of Bitcoin. All four sides of the network effect are playing a valuable part in expanding the value of the overall system, but the fourth is particularly important.
  •  
    WOW! This is the must read article of the year. Great explanation of Bitcoin; what it is, how it works, and why it is so significant. Excellent analysis!
Paul Merrell

The Money Changers Serenade: A New Bankers' Plot to Steal Your Deposits | Global Research - 0 views

  • Writing in the Wall Street Journal (“Confessions of a Quantitative Easer,” November 11, 2013), Andrew Huszar confirms my explanation to be the correct one. Huszar is the Federal Reserve official who implemented the policy of QE. He resigned when he realized that the real purposes of QE was to drive up the prices of the banks’ holdings of debt instruments, to provide the banks with trillions of dollars at zero cost with which to lend and speculate, and to provide the banks with “fat commissions from brokering most of the Fed’s QE transactions.” (See: www.paulcraigroberts.org) This vast con game remains unrecognized by Congress and the public. At the IMF Research Conference on November 8, 2013, former Treasury Secretary Larry Summers presented a plan to expand the con game. Summers says that it is not enough merely to give the banks interest free money. More should be done for the banks. Instead of being paid interest on their bank deposits, people should be penalized for keeping their money in banks instead of spending it. To sell this new rip-off scheme, Summers has conjured up an explanation based on the crude and discredited Keynesianism of the 1940s that explained the Great Depression as a problem caused by too much savings. Instead of spending their money, people hoarded it, thus causing aggregate demand and employment to fall.
  • Summers says that today the problem of too much saving has reappeared. The centerpiece of his argument is “the natural interest rate,” defined as the interest rate at which full employment is established by the equality of saving with investment. If people save more than investors invest, the saved money will not find its way back into the economy, and output and employment will fall. Summers notes that despite a zero real rate of interest, there is still substantial unemployment. In other words, not even a zero rate of interest can reduce saving to the level of investment, thus frustrating a full employment recovery. Summers concludes that the natural rate of interest has become negative and is stuck below zero. How to fix this? The way to fix it, Summers says, is to charge people for saving money. To avoid the charges, people would spend the money, thus reducing savings to the level of investment and restoring full employment. Summers acknowledges that the problem with his solution is that people would take their money out of banks and hoard it in cash holdings. In other words, the cash form of money provides consumers with a freedom to save that holds down consumption and prevents full employment. Summers has a fix for this: eliminate the freedom by imposing a cashless society where the only money is electronic. As electronic money cannot be hoarded except in bank deposits, penalties can be imposed that force unproductive savings into consumption.
  • for Summers, the plight of the consumer is not the problem. The problem is the profits of the banks. Summers has the solution, and the establishment, including Paul Krugman, is applauding it. Once the economy officially turns down again, watch out.
  •  
    Paul Craig Roberts exposes Larry Summers formula for the banksters to grab money from everyone: eliminate all but electronic-currency and penalize savings. Not mentioned by Roberts, but much of the infrastructure for this is already in place. For example, late last year all recipients of Social Security and VA benefit checks were notified that after March 1, 2013, they would be in violation of the law if they continued to receive paper checks. They were required to enroll in approved electronic deposit programs, all of which are offered by banks. Until about two years ago, people could merely state in writing that they didn't want it and could continue receiving paper checks. But Congress closed that loophole.  (I remain out of compliance.) Debit card is now mandatory, although they have not yet enacted penalties for non-compliance.  So the banksters now get the "float" on virtually all federal SS and VA benefit payments until spent. That's as opposed to the prior Treasury Department drafts whose funds were not in the banking system.   More to the point, the web portal for the federal "Go Direct" program to sign up for direct deposit is in place and debugged. It wouldn't take much beyond a bigger data set to issue debit cards for everyone in the U.S. during a transition to a cashless economy.  The Constitution says gold and silver only for payment of debts; paper currency paved the way for financial abuse of the economy by banksters. Now Summers wants to do away with cash entirely in favor of digital currency with penalties for saving? My life savings must be surrendered to a bank so I can be penalized for saving? And of course moving to all-digital currency would give the spy agencies a much more detailed record of your purchases to work with. The location where you bought that last cup of coffee is instantly available to the NSA? Gimme a break!    
Paul Merrell

Cashless Society War Intensifies During Global Epocalypse Washington's Blog - 0 views

  • In the fall of 2015, the world descended into an economic apocalypse that will transform the globe into a single cashless society. This bold prediction is based on trends in nations all over the earth as shown in the article below. As we enter 2016, we are only beginning to see this Epocalypse form through the fog of war. The war I’m talking about is the world war waged furiously by central banks against the Great Recession as the governments they supposedly serve fiddled while their capital burned. The governments and banks of this world advanced rapidly toward forming cashless societies throughout 2015. The citizens of some countries are already embracing the move. In other countries, like the US, citizens fear the loss of autonomy that would come from giving governments and their designated central banks absolute monetary control.
  • The Epocalypse that I’ve been describing in this series will overcome that resistance during 2016 and 2017 as it wrecks economic havoc to such a degree that cash hold-outs will be ready for whatever holds the greatest promise of saving them from their collapsed monetary systems, fallen banks, deflated stocks and suffocating debt. One has only to think about how quickly and readily American citizens forfeited their constitutional civil liberties after 9/11 when George Bush and congress decreed that search warrants were not necessary if the government branded you a “terrorist.” If this sounds like some wild conspiracy theory, consider the following: no less Sterling standard of global economics than The Economist predicted thirty years ago that by 2018 a global currency would rise like the phoenix out of the ashes of the world’s fiat currencies:
  • Charging people to keep their money in the bank is hard to do so long as cash is available, as people may just withdraw all of their money from those banks in the form of the national cash and squirrel the cash away. In order to penetrate the twilight zone of economics, central banks need to abolish cash to terminate this escape route. Then they can force savers to spend, thereby increasing the flow of money through the economy, by raising the cost of holding money in a bank account as high as it takes to get people to spend their money. No sense letting perfectly good money waste away in an expensive bank account. Transitioning into a cashless society is the ultimate central planner’s dream as it gives central banks total control over money, and money is their proprietary product.
  • ...1 more annotation...
  • The drive to breach the national boundaries of money and establish a global cashless society has become a World War on cash with IMF backing to go digital and global.
Paul Merrell

Digital currencies could 'challenge sovereignty' - RTÉ News - 0 views

  • A senior Central Bank official has warned that virtual and digital currencies have the potential to challenge the sovereignty of states. Gareth Murphy was this afternoon addressing Bitfin 2014, a conference on digital money in Dublin. Mr Murphy said rivals to national legal tender pose challenges to central banks' ability to influence the price of credit for the whole economy. He also warned that there would be a substantial threat to the country's finances if more and more transactions for goods and services disappear from the tax net through the use of digital currencies. Mr Murphy cautioned that a loss of consumer confidence in currencies can cause uncertainty, which in turn can lead to a drop in economic activity. The Central Bank has consistently said that it does not recognise and therefore does not regulate digital currencies such as Bitcoin in this country.
  • Mr Murphy, who is Director of Markets Supervision at the Central Bank, said it was well-documented that virtual currencies could provide an alternative channel for people to purchase goods and services using the proceeds for crime. In such scenarios, he added, the application of current anti-money laundering regulations will be tested. Mr Murphy warned that any failure of the payments and settlement infrastructure or "financial plumbing" in Ireland, would have a severe impact on consumer confidence and economic activity in the country. He also cautioned that virtual currencies pose a new challenge to central banks' control over the important functions of monetary and exchange rate policy. Their more widespread use would also make it more difficult for statistical agencies to gather data on economic activity, which are used by governments to steer the economy.
Gary Edwards

Everyone is on the Gold Standard. It's not a choice any country or central bank can make. - 0 views

Dear WSJ Moderator, I tried to post a comment to the community forum for the article, "Currency Chaos; Where do we go from here?" My comments were rejected with the error message, "The language y...

gold gold-currency wsj robert-mundell milton-friedman fiat-currencies

started by Gary Edwards on 20 Oct 10 no follow-up yet
Paul Merrell

Most Agencies Falling Short on Mandate for Online Records - 0 views

  • Nearly 20 years after Congress passed the Electronic Freedom of Information Act Amendments (E-FOIA), only 40 percent of agencies have followed the law's instruction for systematic posting of records released through FOIA in their electronic reading rooms, according to a new FOIA Audit released today by the National Security Archive at www.nsarchive.org to mark Sunshine Week. The Archive team audited all federal agencies with Chief FOIA Officers as well as agency components that handle more than 500 FOIA requests a year — 165 federal offices in all — and found only 67 with online libraries populated with significant numbers of released FOIA documents and regularly updated.
  • Congress called on agencies to embrace disclosure and the digital era nearly two decades ago, with the passage of the 1996 "E-FOIA" amendments. The law mandated that agencies post key sets of records online, provide citizens with detailed guidance on making FOIA requests, and use new information technology to post online proactively records of significant public interest, including those already processed in response to FOIA requests and "likely to become the subject of subsequent requests." Congress believed then, and openness advocates know now, that this kind of proactive disclosure, publishing online the results of FOIA requests as well as agency records that might be requested in the future, is the only tenable solution to FOIA backlogs and delays. Thus the National Security Archive chose to focus on the e-reading rooms of agencies in its latest audit. Even though the majority of federal agencies have not yet embraced proactive disclosure of their FOIA releases, the Archive E-FOIA Audit did find that some real "E-Stars" exist within the federal government, serving as examples to lagging agencies that technology can be harnessed to create state-of-the art FOIA platforms. Unfortunately, our audit also found "E-Delinquents" whose abysmal web performance recalls the teletype era.
  • E-Delinquents include the Office of Science and Technology Policy at the White House, which, despite being mandated to advise the President on technology policy, does not embrace 21st century practices by posting any frequently requested records online. Another E-Delinquent, the Drug Enforcement Administration, insults its website's viewers by claiming that it "does not maintain records appropriate for FOIA Library at this time."
  • ...9 more annotations...
  • "The presumption of openness requires the presumption of posting," said Archive director Tom Blanton. "For the new generation, if it's not online, it does not exist." The National Security Archive has conducted fourteen FOIA Audits since 2002. Modeled after the California Sunshine Survey and subsequent state "FOI Audits," the Archive's FOIA Audits use open-government laws to test whether or not agencies are obeying those same laws. Recommendations from previous Archive FOIA Audits have led directly to laws and executive orders which have: set explicit customer service guidelines, mandated FOIA backlog reduction, assigned individualized FOIA tracking numbers, forced agencies to report the average number of days needed to process requests, and revealed the (often embarrassing) ages of the oldest pending FOIA requests. The surveys include:
  • The federal government has made some progress moving into the digital era. The National Security Archive's last E-FOIA Audit in 2007, " File Not Found," reported that only one in five federal agencies had put online all of the specific requirements mentioned in the E-FOIA amendments, such as guidance on making requests, contact information, and processing regulations. The new E-FOIA Audit finds the number of agencies that have checked those boxes is now much higher — 100 out of 165 — though many (66 in 165) have posted just the bare minimum, especially when posting FOIA responses. An additional 33 agencies even now do not post these types of records at all, clearly thwarting the law's intent.
  • The FOIAonline Members (Department of Commerce, Environmental Protection Agency, Federal Labor Relations Authority, Merit Systems Protection Board, National Archives and Records Administration, Pension Benefit Guaranty Corporation, Department of the Navy, General Services Administration, Small Business Administration, U.S. Citizenship and Immigration Services, and Federal Communications Commission) won their "E-Star" by making past requests and releases searchable via FOIAonline. FOIAonline also allows users to submit their FOIA requests digitally.
  • THE E-DELINQUENTS: WORST OVERALL AGENCIES In alphabetical order
  • Key Findings
  • Excuses Agencies Give for Poor E-Performance
  • Justice Department guidance undermines the statute. Currently, the FOIA stipulates that documents "likely to become the subject of subsequent requests" must be posted by agencies somewhere in their electronic reading rooms. The Department of Justice's Office of Information Policy defines these records as "frequently requested records… or those which have been released three or more times to FOIA requesters." Of course, it is time-consuming for agencies to develop a system that keeps track of how often a record has been released, which is in part why agencies rarely do so and are often in breach of the law. Troublingly, both the current House and Senate FOIA bills include language that codifies the instructions from the Department of Justice. The National Security Archive believes the addition of this "three or more times" language actually harms the intent of the Freedom of Information Act as it will give agencies an easy excuse ("not requested three times yet!") not to proactively post documents that agency FOIA offices have already spent time, money, and energy processing. We have formally suggested alternate language requiring that agencies generally post "all records, regardless of form or format that have been released in response to a FOIA request."
  • Disabilities Compliance. Despite the E-FOIA Act, many government agencies do not embrace the idea of posting their FOIA responses online. The most common reason agencies give is that it is difficult to post documents in a format that complies with the Americans with Disabilities Act, also referred to as being "508 compliant," and the 1998 Amendments to the Rehabilitation Act that require federal agencies "to make their electronic and information technology (EIT) accessible to people with disabilities." E-Star agencies, however, have proven that 508 compliance is no barrier when the agency has a will to post. All documents posted on FOIAonline are 508 compliant, as are the documents posted by the Department of Defense and the Department of State. In fact, every document created electronically by the US government after 1998 should already be 508 compliant. Even old paper records that are scanned to be processed through FOIA can be made 508 compliant with just a few clicks in Adobe Acrobat, according to this Department of Homeland Security guide (essentially OCRing the text, and including information about where non-textual fields appear). Even if agencies are insistent it is too difficult to OCR older documents that were scanned from paper, they cannot use that excuse with digital records.
  • Privacy. Another commonly articulated concern about posting FOIA releases online is that doing so could inadvertently disclose private information from "first person" FOIA requests. This is a valid concern, and this subset of FOIA requests should not be posted online. (The Justice Department identified "first party" requester rights in 1989. Essentially agencies cannot use the b(6) privacy exemption to redact information if a person requests it for him or herself. An example of a "first person" FOIA would be a person's request for his own immigration file.) Cost and Waste of Resources. There is also a belief that there is little public interest in the majority of FOIA requests processed, and hence it is a waste of resources to post them. This thinking runs counter to the governing principle of the Freedom of Information Act: that government information belongs to US citizens, not US agencies. As such, the reason that a person requests information is immaterial as the agency processes the request; the "interest factor" of a document should also be immaterial when an agency is required to post it online. Some think that posting FOIA releases online is not cost effective. In fact, the opposite is true. It's not cost effective to spend tens (or hundreds) of person hours to search for, review, and redact FOIA requests only to mail it to the requester and have them slip it into their desk drawer and forget about it. That is a waste of resources. The released document should be posted online for any interested party to utilize. This will only become easier as FOIA processing systems evolve to automatically post the documents they track. The State Department earned its "E-Star" status demonstrating this very principle, and spent no new funds and did not hire contractors to build its Electronic Reading Room, instead it built a self-sustaining platform that will save the agency time and money going forward.
Paul Merrell

New Snowden Docs Indicate Scope of NSA Preparations for Cyber Battle - SPIEGEL ONLINE - 0 views

  • The NSA's mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars -- a struggle for control of the Internet that is already well underway.
  • The Birth of D Weapons According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money.
  • NSA Docs on Network Attacks and ExploitationExcerpt from the secret NSA budget on computer network operations / Code word GENIE Document about the expansion of the Remote Operations Center (ROC) on endpoint operations Document explaining the role of the Remote Operations Center (ROC) Interview with an employee of NSA's department for Tailored Access Operations about his field of work Supply-chain interdiction / Stealthy techniques can crack some of SIGINT's hardest targets Classification guide for computer network exploitation (CNE) NSA training course material on computer network operations Overview of methods for NSA integrated cyber operations NSA project description to recognize and process data that comes from third party attacks on computers Exploring and exploiting leaky mobile apps with BADASS Overview of projects of the TAO/ATO department such as the remote destruction of network cards iPhone target analysis and exploitation with Apple's unique device identifiers (UDID) Report of an NSA Employee about a Backdoor in the OpenSSH Daemon NSA document on QUANTUMSHOOTER, an implant to remote-control computers with good network connections from unknown third parties
  • ...5 more annotations...
  • From a military perspective, surveillance of the Internet is merely "Phase 0" in the US digital war strategy. Internal NSA documents indicate that it is the prerequisite for everything that follows. They show that the aim of the surveillance is to detect vulnerabilities in enemy systems. Once "stealthy implants" have been placed to infiltrate enemy systems, thus allowing "permanent accesses," then Phase Three has been achieved -- a phase headed by the word "dominate" in the documents. This enables them to "control/destroy critical systems & networks at will through pre-positioned accesses (laid in Phase 0)." Critical infrastructure is considered by the agency to be anything that is important in keeping a society running: energy, communications and transportation. The internal documents state that the ultimate goal is "real time controlled escalation". One NSA presentation proclaims that "the next major conflict will start in cyberspace." To that end, the US government is currently undertaking a massive effort to digitally arm itself for network warfare. For the 2013 secret intelligence budget, the NSA projected it would need around $1 billion in order to increase the strength of its computer network attack operations. The budget included an increase of some $32 million for "unconventional solutions" alone.
  • Part 2: How the NSA Reads Over Shoulders of Other Spies
  • NSA Docs on ExfiltrationExplanation of the APEX method of combining passive with active methods to exfiltrate data from networks attacked Explanation of APEX shaping to put exfiltrating network traffic into patterns that allow plausible deniability Presentation on the FASHIONCLEFT protocol that the NSA uses to exfiltrate data from trojans and implants to the NSA Methods to exfiltrate data even from devices which are supposed to be offline Document detailing SPINALTAP, an NSA project to combine data from active operations and passive signals intelligence Technical description of the FASHIONCLEFT protocol the NSA uses to exfiltrate data from Trojans and implants to the NSA
  • NSA Docs on Malware and ImplantsCSEC document about the recognition of trojans and other "network based anomaly" The formalized process through which analysts choose their data requirement and then get to know the tools that can do the job QUANTUMTHEORY is a set of technologies allowing man-on-the-side interference attacks on TCP/IP connections (includes STRAIGHTBIZARRE and DAREDEVIL) Sample code of a malware program from the Five Eyes alliance
  • According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money. During the 20th century, scientists developed so-called ABC weapons -- atomic, biological and chemical. It took decades before their deployment could be regulated and, at least partly, outlawed. New digital weapons have now been developed for the war on the Internet. But there are almost no international conventions or supervisory authorities for these D weapons, and the only law that applies is the survival of the fittest. Canadian media theorist Marshall McLuhan foresaw these developments decades ago. In 1970, he wrote, "World War III is a guerrilla information war with no division between military and civilian participation." That's precisely the reality that spies are preparing for today.
  •  
    Major dump of new Snowden NSA docs by Der Spiegel, with an article by a large team of reporters and computer security experts. Topic: Cyberwar capabilities, now and in the near future. 
Gary Edwards

U.S. Treasury Says Financial Crisis Is Over But The Next One May Be Right In Front Of Us - 0 views

  •  
    More great charts, this time courtesy of the US Treasury Department. The charts use select areas of measurement to show a slowly improving economy, with the private sector leading the way. What the charts don't show or discuss is that the Obama economy has been assisted by $3 Trillion in Federal Reserve Bankster Cartel "quantitative easing", and the $5 Trillion in debt that Obama spending has racked up. Throw in the secret $16.1 Trillion the Federal Reserve pumped into the international bankster system, and the question becomes, "Where is all this money going? And why isn't the economy jumping?" The numbers are staggering. One chart provided by Treasury shows a successful TARP program where the Banksters have paid back in full the massive bailout funds. One has to wonder though, are they paying back the taxpayer bailout with newly generated profits? Or are they simply using freshly printed Federal Reserve dollars ($19.1 Trillion by the Federal Reserve's count), passed to them at zero interest? The shell game Obama, the ruling establishment, and the Federal Reserve Bankster Cartel have been playing may be running out of steam. We're now in the money laundering stage where Banksters and trading partners like China are dumping their digital-ions of dollars for real property, corporate assets and hard currencies. The St Louis branch of the Federal Reserve Cartel says as much in their most recent economic study. From the article: ....... The nation's debt load has grown to the point where the U.S. is now threatened with bankruptcy but the economy is not likely to grow fast enough to reduce the need for additional government borrowing. Empirical studies have shown a strong correlation between high levels of debt and reduced economic growth which results in decreased government revenue as explained below.......... An essay published by the St. Louis Federal Reserve on the Federal debt poised the question, "Too Little Revenue or Too Much Spe
Paul Merrell

Spies Infiltrate a Fantasy Realm of Online Games - NYTimes.com - 0 views

  • Not limiting their activities to the earthly realm, American and British spies have infiltrated the fantasy worlds of World of Warcraft and Second Life, conducting surveillance and scooping up data in the online games played by millions of people across the globe, according to newly disclosed classified documents.
  • Fearing that terrorist or criminal networks could use the games to communicate secretly, move money or plot attacks, the documents show, intelligence operatives have entered terrain populated by digital avatars that include elves, gnomes and supermodels. The spies have created make-believe characters to snoop and to try to recruit informers, while also collecting data and contents of communications between players, according to the documents, disclosed by the former National Security Agency contractor Edward J. Snowden. Because militants often rely on features common to video games — fake identities, voice and text chats, a way to conduct financial transactions — American and British intelligence agencies worried that they might be operating there, according to the papers.
  • Online games might seem innocuous, a top-secret 2008 N.S.A. document warned, but they had the potential to be a “target-rich communication network” allowing intelligence suspects “a way to hide in plain sight.” Virtual games “are an opportunity!” another 2008 N.S.A. document declared. But for all their enthusiasm — so many C.I.A., F.B.I. and Pentagon spies were hunting around in Second Life, the document noted, that a “deconfliction” group was needed to avoid collisions — the intelligence agencies may have inflated the threat. The documents, obtained by The Guardian and shared with The New York Times and ProPublica, do not cite any counterterrorism successes from the effort. Former American intelligence officials, current and former gaming company employees and outside experts said in interviews that they knew of little evidence that terrorist groups viewed the games as havens to communicate and plot operations.
  • ...5 more annotations...
  • In the 2008 N.S.A. document, titled “Exploiting Terrorist Use of Games & Virtual Environments,” the agency said that “terrorist target selectors” — which could be a computer’s Internet Protocol address or an email account — “have been found associated with Xbox Live, Second Life, World of Warcraft” and other games. But that document does not present evidence that terrorists were participating in the games. Still, the intelligence agencies found other benefits in infiltrating these online worlds. According to the minutes of a January 2009 meeting, GCHQ’s “network gaming exploitation team” had identified engineers, embassy drivers, scientists and other foreign intelligence operatives to be World of Warcraft players — potential targets for recruitment as agents.
  • The surveillance, which also included Microsoft’s Xbox Live, could raise privacy concerns. It is not clear exactly how the agencies got access to gamers’ data or communications, how many players may have been monitored or whether Americans’ communications or activities were captured. One American company, the maker of World of Warcraft, said that neither the N.S.A. nor its British counterpart, the Government Communications Headquarters, had gotten permission to gather intelligence in its game. Many players are Americans, who can be targeted for surveillance only with approval from the nation’s secret intelligence court. The spy agencies, though, face far fewer restrictions on collecting certain data or communications overseas.
  • “The Sigint Enterprise needs to begin taking action now to plan for collection, processing, presentation and analysis of these communications,” said one April 2008 N.S.A. document, referring to “signals intelligence.” The document added, “With a few exceptions, N.S.A. can’t even recognize the traffic,” meaning that the agency could not distinguish gaming data from other Internet traffic. By the end of 2008, according to one document, the British spy agency, known as GCHQ, had set up its “first operational deployment into Second Life” and had helped the police in London in cracking down on a crime ring that had moved into virtual worlds to sell stolen credit card information. The British spies running the effort, which was code-named Operation Galician, were aided by an informer using a digital avatar “who helpfully volunteered information on the target group’s latest activities.”
  • Even before the American government began spying in virtual worlds, the Pentagon had identified the potential intelligence value of video games. The Pentagon’s Special Operations Command in 2006 and 2007 worked with several foreign companies — including an obscure digital media business based in Prague — to build games that could be downloaded to mobile phones, according to people involved in the effort. They said the games, which were not identified as creations of the Pentagon, were then used as vehicles for intelligence agencies to collect information about the users. Eager to cash in on the government’s growing interest in virtual worlds, several large private contractors have spent years pitching their services to American intelligence agencies. In one 66-page document from 2007, part of the cache released by Mr. Snowden, the contracting giant SAIC promoted its ability to support “intelligence collection in the game space,” and warned that online games could be used by militant groups to recruit followers and could provide “terrorist organizations with a powerful platform to reach core target audiences.”
  • In spring 2009, academics and defense contractors gathered at the Marriott at Washington Dulles International Airport to present proposals for a government study about how players’ behavior in a game like World of Warcraft might be linked to their real-world identities. “We were told it was highly likely that persons of interest were using virtual spaces to communicate or coordinate,” said Dmitri Williams, a professor at the University of Southern California who received grant money as part of the program. After the conference, both SAIC and Lockheed Martin won contracts worth several million dollars, administered by an office within the intelligence community that finances research projects.
  •  
    Coming soon: disclosure of the NSA's public bathroom cams and microphones because people talk there and exchange germs that might have DNA in them that can be used to track terrorists. 
Paul Merrell

Tomgram: Alfred McCoy, It's About Blackmail, Not National Security | TomDispatch - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.  Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.  The answer is remarkably simple.  For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.  Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies. Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  • Once upon a time, such surveillance was both expensive and labor intensive. Today, however, unlike the U.S. Army’s shoe-leather surveillance during World War I or the FBI’s break-ins and phone bugs in the Cold War years, the NSA can monitor the entire world and its leaders with only 100-plus probes into the Internet’s fiber optic cables. This new technology is both omniscient and omnipresent beyond anything those lacking top-secret clearance could have imagined before the Edward Snowden revelations began.  Not only is it unimaginably pervasive, but NSA surveillance is also a particularly cost-effective strategy compared to just about any other form of global power projection. And better yet, it fulfills the greatest imperial dream of all: to be omniscient not just for a few islands, as in the Philippines a century ago, or a couple of countries, as in the Cold War era, but on a truly global scale. In a time of increasing imperial austerity and exceptional technological capability, everything about the NSA’s surveillance told Washington to just “go for it.”  This cut-rate mechanism for both projecting force and preserving U.S. global power surely looked like a no-brainer, a must-have bargain for any American president in the twenty-first century -- before new NSA documents started hitting front pages weekly, thanks to Snowden, and the whole world began returning the favor.
  • ...12 more annotations...
  • As the gap has grown between Washington’s global reach and its shrinking mailed fist, as it struggles to maintain 40% of world armaments (the 2012 figure) with only 23% of global gross economic output, the U.S. will need to find new ways to exercise its power far more economically. As the Cold War took off, a heavy-metal U.S. military -- with 500 bases worldwide circa 1950 -- was sustainable because the country controlled some 50% of the global gross product. But as its share of world output falls -- to an estimated 17% by 2016 -- and its social welfare costs climb relentlessly from 4% of gross domestic product in 2010 to a projected 18% by 2050, cost-cutting becomes imperative if Washington is to survive as anything like the planet’s “sole superpower.” Compared to the $3 trillion cost of the U.S. invasion and occupation of Iraq, the NSA’s 2012 budget of just $11 billion for worldwide surveillance and cyberwarfare looks like cost saving the Pentagon can ill-afford to forego. Yet this seeming “bargain” comes at what turns out to be an almost incalculable cost. The sheer scale of such surveillance leaves it open to countless points of penetration, whether by a handful of anti-war activists breaking into an FBI field office in Media, Pennsylvania, back in 1971 or Edward Snowden downloading NSA documents at a Hawaiian outpost in 2012.
  • In October 2001, not satisfied with the sweeping and extraordinary powers of the newly passed Patriot Act, President Bush ordered the National Security Agency to commence covert monitoring of private communications through the nation's telephone companies without the requisite FISA warrants. Somewhat later, the agency began sweeping the Internet for emails, financial data, and voice messaging on the tenuous theory that such “metadata” was “not constitutionally protected.” In effect, by penetrating the Internet for text and the parallel Public Switched Telephone Network (PSTN) for voice, the NSA had gained access to much of the world’s telecommunications. By the end of Bush’s term in 2008, Congress had enacted laws that not only retrospectively legalized these illegal programs, but also prepared the way for NSA surveillance to grow unchecked. Rather than restrain the agency, President Obama oversaw the expansion of its operations in ways remarkable for both the sheer scale of the billions of messages collected globally and for the selective monitoring of world leaders.
  • By 2012, the centralization via digitization of all voice, video, textual, and financial communications into a worldwide network of fiber optic cables allowed the NSA to monitor the globe by penetrating just 190 data hubs -- an extraordinary economy of force for both political surveillance and cyberwarfare.
  • With a few hundred cable probes and computerized decryption, the NSA can now capture the kind of gritty details of private life that J. Edgar Hoover so treasured and provide the sort of comprehensive coverage of populations once epitomized by secret police like East Germany’s Stasi. And yet, such comparisons only go so far. After all, once FBI agents had tapped thousands of phones, stenographers had typed up countless transcripts, and clerks had stored this salacious paper harvest in floor-to-ceiling filing cabinets, J. Edgar Hoover still only knew about the inner-workings of the elite in one city: Washington, D.C.  To gain the same intimate detail for an entire country, the Stasi had to employ one police informer for every six East Germans -- an unsustainable allocation of human resources. By contrast, the marriage of the NSA’s technology to the Internet’s data hubs now allows the agency’s 37,000 employees a similarly close coverage of the entire globe with just one operative for every 200,000 people on the planet
  • Through the expenditure of $250 million annually under its Sigint Enabling Project, the NSA has stealthily penetrated all encryption designed to protect privacy. “In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” reads a 2007 NSA document. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.” By collecting knowledge -- routine, intimate, or scandalous -- about foreign leaders, imperial proconsuls from ancient Rome to modern America have gained both the intelligence and aura of authority necessary for dominion over alien societies. The importance, and challenge, of controlling these local elites cannot be overstated. During its pacification of the Philippines after 1898, for instance, the U.S. colonial regime subdued contentious Filipino leaders via pervasive policing that swept up both political intelligence and personal scandal. And that, of course, was just what J. Edgar Hoover was doing in Washington during the 1950s and 1960s.
  • Indeed, the mighty British Empire, like all empires, was a global tapestry woven out of political ties to local leaders or “subordinate elites” -- from Malay sultans and Indian maharajas to Gulf sheiks and West African tribal chiefs. As historian Ronald Robinson once observed, the British Empire spread around the globe for two centuries through the collaboration of these local leaders and then unraveled, in just two decades, when that collaboration turned to “non-cooperation.” After rapid decolonization during the 1960s transformed half-a-dozen European empires into 100 new nations, their national leaders soon found themselves the subordinate elites of a spreading American global imperium. Washington suddenly needed the sort of private information that could keep such figures in line. Surveillance of foreign leaders provides world powers -- Britain then, America now -- with critical information for the exercise of global hegemony. Such spying gave special penetrating power to the imperial gaze, to that sense of superiority necessary for dominion over others.  It also provided operational information on dissidents who might need to be countered with covert action or military force; political and economic intelligence so useful for getting the jump on allies in negotiations of all sorts; and, perhaps most important of all, scurrilous information about the derelictions of leaders useful in coercing their compliance.
  • In late 2013, the New York Times reported that, when it came to spying on global elites, there were “more than 1,000 targets of American and British surveillance in recent years,” reaching down to mid-level political actors in the international arena. Revelations from Edward Snowden’s cache of leaked documents indicate that the NSA has monitored leaders in some 35 nations worldwide -- including Brazilian president Dilma Rousseff, Mexican presidents Felipe Calderón and Enrique Peña Nieto, German Chancellor Angela Merkel, and Indonesia’s president Susilo Bambang Yudhoyono.  Count in as well, among so many other operations, the monitoring of “French diplomatic interests” during the June 2010 U.N. vote on Iran sanctions and “widespread surveillance” of world leaders during the Group 20 summit meeting at Ottawa in June 2010. Apparently, only members of the historic “Five Eyes” signals-intelligence alliance (Australia, Canada, New Zealand, and Great Britain) remain exempt -- at least theoretically -- from NSA surveillance. Such secret intelligence about allies can obviously give Washington a significant diplomatic advantage. During U.N. wrangling over the U.S. invasion of Iraq in 2002-2003, for example, the NSA intercepted Secretary-General Kofi Anan’s conversations and monitored the “Middle Six” -- Third World nations on the Security Council -- offering what were, in essence, well-timed bribes to win votes. The NSA’s deputy chief for regional targets sent a memo to the agency’s Five Eyes allies asking “for insights as to how membership is reacting to on-going debate regarding Iraq, plans to vote on any related resolutions [..., and] the whole gamut of information that could give U.S. policymakers an edge in obtaining results favorable to U.S. goals.”
  • Indicating Washington’s need for incriminating information in bilateral negotiations, the State Department pressed its Bahrain embassy in 2009 for details, damaging in an Islamic society, on the crown princes, asking: “Is there any derogatory information on either prince? Does either prince drink alcohol? Does either one use drugs?” Indeed, in October 2012, an NSA official identified as “DIRNSA,” or Director General Keith Alexander, proposed the following for countering Muslim radicals: “[Their] vulnerabilities, if exposed, would likely call into question a radicalizer’s devotion to the jihadist cause, leading to the degradation or loss of his authority.” The agency suggested that such vulnerabilities could include “viewing sexually explicit material online” or “using a portion of the donations they are receiving… to defray personal expenses.” The NSA document identified one potential target as a “respected academic” whose “vulnerabilities” are “online promiscuity.”
  • Just as the Internet has centralized communications, so it has moved most commercial sex into cyberspace. With an estimated 25 million salacious sites worldwide and a combined 10.6 billion page views per month in 2013 at the five top sex sites, online pornography has become a global business; by 2006, in fact, it generated $97 billion in revenue. With countless Internet viewers visiting porn sites and almost nobody admitting it, the NSA has easy access to the embarrassing habits of targets worldwide, whether Muslim militants or European leaders. According to James Bamford, author of two authoritative books on the agency, “The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to ‘neutralize’ their targets.”
  • Indeed, whistleblower Edward Snowden has accused the NSA of actually conducting such surveillance.  In a December 2013 letter to the Brazilian people, he wrote, “They even keep track of who is having an affair or looking at pornography, in case they need to damage their target's reputation.” If Snowden is right, then one key goal of NSA surveillance of world leaders is not U.S. national security but political blackmail -- as it has been since 1898. Such digital surveillance has tremendous potential for scandal, as anyone who remembers New York Governor Eliot Spitzer’s forced resignation in 2008 after routine phone taps revealed his use of escort services; or, to take another obvious example, the ouster of France’s budget minister Jérôme Cahuzac in 2013 following wire taps that exposed his secret Swiss bank account. As always, the source of political scandal remains sex or money, both of which the NSA can track with remarkable ease.
  • By starting a swelling river of NSA documents flowing into public view, Edward Snowden has given us a glimpse of the changing architecture of U.S. global power. At the broadest level, Obama’s digital “pivot” complements his overall defense strategy, announced in 2012, of reducing conventional forces while expanding into the new, cost-effective domains of space and cyberspace. While cutting back modestly on costly armaments and the size of the military, President Obama has invested billions in the building of a new architecture for global information control. If we add the $791 billion expended to build the Department of Homeland Security bureaucracy to the $500 billion spent on an increasingly para-militarized version of global intelligence in the dozen years since 9/11, then Washington has made a $1.2 trillion investment in a new apparatus of world power.
  • So formidable is this security bureaucracy that Obama’s recent executive review recommended the regularization, not reform, of current NSA practices, allowing the agency to continue collecting American phone calls and monitoring foreign leaders into the foreseeable future. Cyberspace offers Washington an austerity-linked arena for the exercise of global power, albeit at the cost of trust by its closest allies -- a contradiction that will bedevil America’s global leadership for years to come. To update Henry Stimson: in the age of the Internet, gentlemen don't just read each other’s mail, they watch each other’s porn. Even if we think we have nothing to hide, all of us, whether world leaders or ordinary citizens, have good reason to be concerned.
Gary Edwards

What Is Bitcoin - 0 views

  •  
    That GOLD! app for iOS and Android is looking pretty good :)  C'mon Tino.  Now is the time.  Link to Priced-in-gold (http://pricedingold.com) excerpt: You may be dreaming of a gold backed dollar, or just everyone carrying around clinking gold coins in their pockets, but a rising community has a different idea. It's called Bitcoin, and it's a peer-to-peer currency that can be used to exchange goods and services online, digital and otherwise, without fees. In order to get Bitcoins, you need to exchange other currencies for Bitcoins (like dollars, euros, or pounds) at places like Mt.Gox. You can also sell goods and services online for Bitcoins. Some examples of Bitcoin stores include online gaming credits, pet wear, and coffee (more examples here). OR, you can create a new 'block,' which is a series of transactions, and you will receive 50 bitcoins. This is very rare, however, and the value of creating a new block will decrease over time. The idea behind Bitcoin is that it is a peer-to-peer exchange system, with an established and predictable rate of currency production. The creation of bitcoins is restricted by an algorithm, so the currency's worth cannot be modified by any actor (banks, central banks, treasuries). Individuals are involved in "mining" for Bitcoins, but it is extremely costly and requires significant computing power. Bitcoins could theoretically act as a store of value in the event of further inflation and devaluation of the U.S. dollar or other currencies.
Paul Merrell

Americans on Wrong Side of Income Gap Run Out of Means to Cope - 0 views

  • “We’ve exhausted our coping mechanisms,” said Alan Krueger, an economics professor at Princeton University in New Jersey and former chairman of President Barack Obama’s Council of Economic Advisers. “They weren’t sustainable.” The result has been a downsizing of expectations. By almost two to one — 64 percent to 33 percent — Americans say the U.S. no longer offers everyone an equal chance to get ahead, according to the latest Bloomberg National Poll. The lack of faith is especially pronounced among those making less than $50,000 a year, with close to three-quarters in the Dec. 6-9 survey saying the economy is unfair.
  • The diminished expectations have implications for the economy. Workers are clinging to their jobs as prospects fade for higher-paying employment. Households are socking away more money and charging less on credit cards. And young adults are living with their parents longer rather than venturing out on their own. In the meantime, record-high stock prices are enriching wealthier Americans, exacerbating polarization and bringing income inequality to the political forefront. Even independent government agencies like the Securities and Exchange Commission and the Federal Reserve have been dragged into the debate.
  • “The basic bargain at the heart of our economy has frayed,” Obama said in a Dec. 4 speech in Washington. “This is the defining challenge of our time: Making sure our economy works for every working American.” Democratic lawmakers also intend to press next year for a higher minimum wage to tackle the yawning gap between rich and poor, Durbin said. Republicans aren’t ceding the issue. “The American dream is certainly more in doubt than in decades,” House Speaker John Boehner of Ohio said in response to Obama’s speech. “But after more than five years in office, the president has no one to blame but himself.”
  • ...11 more annotations...
  • Income inequality has been rising more or less steadily since the mid-1970s. The Gini coefficient, a broad-based measure of inequality, stood at a record high last year, according to Census Bureau data dating back 46 years.
  • Women who became unemployed during the recession and its aftermath have been slower to find new positions. Among women losing jobs they’d held for at least three years between January 2009 and the end of 2011, 50 percent were re-employed by the start of 2012, while the share for men was 61 percent, according to a Bureau of Labor Statistics report released in February. Households turned to stepped-up borrowing to help make ends meet, until that avenue was shut off by the collapse of house prices. About 10.8 million homeowners still owed more money on their mortgages than their properties were worth in the third quarter, according to Seattle-based Zillow Inc. The fallout has made many Americans less inclined to take risks. The quits rate — the proportion of Americans in the workforce who voluntarily left their jobs — stood at 1.7 percent in October. While that’s up from 1.5 percent a year earlier, it’s below the 2.2 percent average for 2006, the year house prices started falling, government data show.
  • “The middle has really collapsed,” said Lawrence Katz, an economics professor at Harvard University in Cambridge, Massachusetts, and a former chief economist at the Labor Department in Washington. Even those with college degrees are having trouble keeping up, he said. While they earn more than those with less schooling, they’ve seen no real wage growth in recent years. The median income of men 25 years of age and older with a bachelor’s degree was $56,656 last year, 10 percent less than in 2007 after taking account of inflation, according to Census data.
  • It’s the richest of the rich who are reaping the most benefit as an increasingly interconnected and technologically sophisticated world puts a premium on those perceived to have the highest skills — a phenomenon dubbed “winner take all” by Cornell University Professor Robert Frank. Government policies also play a role. The Treasury Department, for instance, taxes capital gains racked up by the wealthy on the sale of shares, bonds and other assets at about half the rate of ordinary income. The top 1 percent captured 95 percent of the gains in incomes in the first three years of the recovery, based on analysis of tax returns by Saez. Those less well-off, meanwhile, are running out of ways to cope. The percentage of working-age women who are in the labor force steadily climbed from a post-World War II low of 32 percent to a peak of 60.3 percent in April 2000, fueling a jump in dual-income households and helping Americans deal with slow wage growth for a while. Since the recession ended, the workforce participation rate for women has been in decline, echoing a longer-running trend among men. November data showed 57 percent of women in the labor force and 69.4 percent of men.
  • The disparity has widened since the recovery began in mid-2009. The richest 10 percent of Americans earned a larger share of income last year than at any time since 1917, according to Emmanuel Saez, an economist at the University of California at Berkeley. Those in the top one-tenth of income distribution made at least $146,000 in 2012, almost 12 times what those in the bottom tenth made, Census Bureau data show. Economists have posited a variety of explanations for the growing differences in incomes. Manufacturing companies moved once high-paying jobs abroad, to China and elsewhere. Technological advances led to the loss of clerical and office work, especially relating to routine tasks. The decline of unions — 11.3 percent of workers were represented in 2012 compared with 20.1 percent in 1983 — has advantaged bosses at the expense of their employees.
  • Millennials — adults aged 18 to 32 — are still slow to set out on their own more than four years after the recession ended, according to an Oct. 18 report by the Pew Research Center in Washington. Just over one in three head their own households, close to a 38-year low set in 2010. Obama has proposed a raft of policies to attack the widening wage gap — from simplifying the tax code and increasing exports to enhancing worker training and boosting pre-kindergarten education. Yet in a divided Washington he hasn’t made much progress pushing them through. The president’s renewed focus on income inequality has more to do with politics than policy, said Douglas Holtz-Eakin, president of the American Action Forum, a self-described center- right institute in Washington.
  • “It’s great politics to demagogue income distribution and complain about the rich getting ahead and the poor falling behind,” said Holtz-Eakin, a former Congressional Budget Office director. “The substance of what he’s actually done doesn’t match the enormity of the problem as he’s portrayed it.”
  • The wage-gap debate has reverberated to other parts of Washington, as the SEC published a rule Sept. 18 that would compel public companies to reveal pay ratios between chief executives and their employees. While businesses have decried the requirement as overreach, some investors welcome the data as a way to help assess a company’s health.
  • Across companies in the S&P 500, the average multiple of CEO compensation to that of rank-and-file workers is 204, up 20 percent since 2009, according to data compiled by Bloomberg in April. The Fed also has been caught up in the debate over growing income disparities. Lawmakers from both parties have questioned whether its bond-buying policy, called quantitative easing, has benefited the rich at the expense of those less well-off by boosting prices of stocks and other assets.
  • The S&P 500 stock index has risen 29 percent in 2013. The richest third of U.S. households account for 89 percent of all equities ownership, according to the Center for Retirement Research at Boston College.
  • Janet Yellen, nominated to take over as Fed chairman next year, defended the central bank’s actions at a Senate Banking Committee hearing on Nov. 14. “The policies we’ve undertaken have been meant to generate a robust recovery,” Yellen told the committee. The growing calls for action to reduce income inequality have translated into a national push for a higher minimum wage. Fast-food workers in 100 cities took to the streets Dec. 5 to demand a $15 hourly salary.
  •  
    Monetary policy of, by, and for banksters continues in the U.S. One irony is that banksters press for transition to an all digital currency so that savers can be penalized, a blatant "trickle-up"economic policy, whilst also pressing for more bank bailouts, wielding the thoroughly-discredited "trickle down" economic theory. But "trickle down" theory, in the context of bank bailouts, has not successfully trickled down and the only beneficiaries have been the few Americans who can still invest in the stock market, paying the highest dividends to the wealthiest among us. Has their ever been a time when the stock market's behavior has been so divorced from the well-being of the middle and lower economic classes? I doubt there has been at least in the last 50 years. Where would we be if the bank bail-out trillions had instead been mailed as checks to the middle and lower economic classes? "Trickle up" works and that is what built the American economy to its peak in inflation-adjusted dollars -- an affluent middle class. But do not expect leadership from Washington, D.C. in correcting income inquequality; only political rhetoric and a fight over extension of unemployment benefits, now lapsed. "According to the World Bank, the GINI coefficient "measures the extent to which the distribution of income or consumption expenditure among individuals households within an economy deviates from a perfectly equal distribution." Therefore it is used as an indication of income inequality within countries. ... In the late 2000s, Chile had the highest GINI coefficient, after taxes and transfers, among OECD member countries. The United States, Turkey and Mexico came right before it. At the other end of the scale, Slovenia, Denmark and Norway led the ranking with the lowest levels of income inequality." http://www.gfmag.com/tools/global-database/economic-data/11944-wealth-distribution-income-inequality.html#ixzz2pGpv4xGZ Higher minimum wages? How about instead abolishing the Feder
Paul Merrell

Report: Verizon Claimed Public Utility Status To Get Government Perks - Slashdot - 0 views

  • Research for the Public Utility Law Project (PULP) has been released which details 'how Verizon deliberately moves back and forth between regulatory regimes, classifying its infrastructure either like a heavily regulated telephone network or a deregulated information service depending on its needs. The chicanery has allowed Verizon to raise telephone rates, all the while missing commitments for high-speed internet deployment' (PDF). In short, Verizon pushed for the government to give it common carrier privileges under Title II in order to build out its fiber network with tax-payer money. Result: increased service rates on telephone users to subsidize Verizon's 'infrastructure investment.' When it comes to regulations on Verizon's fiber network, however, Verizon has been pushing the government to classify its services as that of information only — i.e., beyond Title II. Verizon has made about $4.4 billion in additional revenue in New York City alone, 'money that's funneled directly from a Title II service to an array of services that currently lie beyond Title II's reach.' And it's all legal. An attorney at advocacy group Public Knowledge said it best: 'To expect that you can come in and use public infrastructure and funds to build a network and then be free of any regulation is absurd....When Verizon itself is describing these activities as a Title II common carrier, how can the FCC look at broadband internet and continue acting as though it's not a telecommunication network?'"
  •  
    Let's also not forget that what is now named "Verizon" used to be named Bell Atlantic, one of the seven Baby Bells that were spun off by AT&T by government order during antitrust proceedings.  In other words, this is one of the companies rate-payers financed through a heavily-regulated analog telephony absolute monopoly. But Verizon wants to spread its wings and escape the chains of regulation as a telecommunications carrier. While having its cake and eating it to, according to this article. The FCC has poised itself through a proposed rule with the flexibility to postpone a decision on net neutrality.  AT&T famously was allowed to keep its R&D arm while being freed of the expense of upgrading the U.S. telephony network from analog to digital and from copper wire to fibre optic.  And pay for those Baby Bells to make that transition we did. I remember monthly bills for a two person office running as high as $1,100 a month for calls all carried from Baby Bell to AT&T and back to another Baby Bell. All at state-regulated rates with FCC looking the other way. But now Verizon, Comcast (the originally munipally regulated cable television monopolies) and the few other "competing" survivors of that broadband rollout, having had their infrastructure paid for by the ratepayers, want to fly off and begin charging us at the other end of the pipe,via charges to content providers that will be passed on to us. Leading to the squeezing out of Mom and Pop internet businesses by the big content providers that can afford the charges and pass them on to us. This is looking more and more like another massive rip-off of the customers who already paid for that infrasture. Is that banksters I smell, privatizing a enormous public utility in the name of free markets?      
Gary Edwards

Chinese agency bans online mention of Panama Papers - CNET - 0 views

  •  
    "China is flexing its censorship muscles yet again, banning any online mention of the widely publicized Panama Papers. A government agency sent an order to media groups to "find and delete reprinted reports of the Panama Papers. Do not follow up on related content, no exceptions," according to the China Digital Times. "If material from foreign media attacking China is found on any website, it will be dealt with severely." The Panama Papers refer to 2.6 terabytes of information published online Sunday after a yearlong investigation by the International Consortium of Investigative Journalists, a German newspaper and other news groups. The more than 11 million legal and financial records were stolen from Panama-based law firm Mossack Fonseca's servers. They focus on 140 politicians and public officials worldwide with previously undisclosed involvement in or ownership of offshore financial havens. Relatives of eight current or former members of China's ruling party were implicated. MORE ON THE PANAMA PAPERS Panama Papers show no one's secrets safe Panama Papers leak claims its first victim The most significant findings among the Chinese officials were secret offshore activities linked to the family of Xi Jinping, the country's president. His brother-in-law, Deng Jiagui, was named. Xi assumed office in 2013 and has led a public charge against corruption in China. Also named were Li Xiaolin, daughter of former premier Li Peng, and Jasmine Li, granddaughter of former Standing Committee member Jia Qinglin. The Chinese agency also ordered that references be removed relating to money laundering of people associated with Russian President Vladamir Putin. The Global Times, a publication run by the Chinese government, posted an op-ed shortly after the leaks that implied the Panama Papers' information had been distorted to make countries like China and Russia look bad. The leaks have already made an impact, with Iceland Prime Minister Sigmundur David Gunnlaugsson resigni
Gary Edwards

The Sides Are Forming For The Coming Civil War. | Militia News - 1 views

  • America is in the choosing sides phase of the coming civil war. To use a college recruiting phrase, it is accurate to state that the letters of intent to join one side or another have mostly been signed and the commitments offered. However, there is one big uncommitted piece, but very soon the sides will be drawn.
  • The Chess Pieces of Civil War What is going on today in America all about choosing sides. There are clear lines being formed in the United States. The recruiting pool consists of the Department of Homeland Security, the American military, local law enforcement, the Russian troops pouring into the United States, the trickle of Chinese troops coming into the country through Hawaii and, of course, the poor, the middle class and elite. This is the recruiting pool which will form the chess pieces of the coming American Civil War. Even if all parties in this country wanted the country to continue, even in its present mortally wounded state, it would be foolish to believe that it could continue for much longer.
  • Barring a false flag event, US martial law will have a trigger event, which will lead to martial law, that will be financial and it will naturally occur as we are already on a collision course with destiny.
  • ...18 more annotations...
  • The net result of these staggering numbers can only end one way, and that is with a financial collapse, followed by a bank holiday, rioting in the streets and the full roll out of martial law. These financial numbers guarantee that the party cannot continue much longer. Since America, in her present form, cannot continue much longer without experiencing a cataclysmic shift, we would be wise to realize what resources are going to be the impetus for civil war. When you play the board game, Monopoly, the properties on Boardwalk are among the most coveted. It is no different in real life. The biggest prize of the coming conflict is real estate. Homes, office buildings and shopping malls are the most coveted prize. The MERS mortgage fraud continues unabated as millions of homes have been confiscated through mortgage fraud. When the dollar is worthless and is awaiting its replacement (e.g. the Amero or the Worldo), real estate will be more valuable than gold.
  • Other big game that is being hunted by both sides in the coming civil war will be bank accounts, which must be looted before the dormant computer digits we call money can be converted into hard assets. That is why my advice is, and has been, convert your cash into tangible assets which can enhance your survivability in the upcoming crash.
  • Also, your pensions, your 401K’s and your various entitlement programs are also at risk as evidenced by Secretary of Treasury Jack Lew’s “borrowing” from various Federal retirement accounts in order to increase the debt ceiling fight that will resurface in Congress, again, early next year.
  • Again, my advice is to convert your assets in tangible items which will aid in getting you through some very dark days coming up in the near future.
  • Before the cognitive dissonance crowd rears their ugly heads and accuses me of fear mongering, ask yourself what the elite did prior to the crash of the economy in 1929. For example, Joseph Kennedy took his money out of the stock market the day BEFORE it crashed. Vanderbilt, Rockefeller, Westinghouse, et al., all took their money out just prior to the crash, leaving the ignorant masses unaware of what was coming. Don’t make the same mistake.
  • I have news for you, there are Federal officials in every town, city and county in America. If one violates HR 347, they will be immediately arrested and charged with a felony.
  • The NDAA constitutes another big fence being built around the people in which all due process will soon be gone. The NDAA will allow the administration the “legal” right to secretly remove any burgeoning leadership of citizen opposition forces.
  • There are three paramount numbers that every American should be paying attention to and they are (1) national deficit ($17 trillion dollars), (2) the unfunded liabilities debt ($238 trillion dollars), and (3) the derivatives/futures debt (one quadrillion dollars which is 16 times the entire wealth of the planet.
  • In short, this spells the potential enslavement of the American people.
  • For those of you who still have your blinders on, research the NDAA and EO 13603 and then when you realize that I am correct in my interpretation, ask yourself one question; If the powers that be were not going to seize every important asset, then why would the government give itself the power to do just that?
  • And while you are at it, remember the Clean Water Act gives the EPA to control all private property as well as the precious resources of all water. And then of course, the FDA and the conflicts with local farmers is escalating.
  • And if this is not enough to convince the sheep of this country that the storm clouds are overhead, then take a look at HR 347 which outlaws protesting and takes away the First Amendment. This unconstitutional legislation makes it illegal to criticize the President and the government, as a whole, in the presence of Federal officials.
  • The second provision which will allow this country to quickly transition to martial law is Executive Order (EO) 13603 which allows the President to take control over any resource, property and even human labor within the United States. This EO gives the President unlimited authority including the ability to initiate a civilian draft as well as a military draft.
  • I just saw the Hunger Games sequel, Catching Fire, and this is eerily similar to what I saw in the movies in that the people are being provoked to revolution.
  • in the TV show, Revolution, the most evil entity in the series is the re-emergence of the United States government and the heroes of the show are rebelling against the abuse.
  • It seems like everywhere we turn in the media, the people are being encouraged to rise up now and challenge authority. I am sure the establishment would rather confront a small group of dissidents and squelch the rebellion now, before the numbers can become significant and overwhelming to the establishment and this theme is being carried out in the media.
  • The final action will consist of gun confiscation and one side of the coming conflict is attempting to position themselves to do that in the near future and that would be the DHS, the Russians and the Chinese.
  • I cannot think of another legitimate reason which would describe why they are here.
  •  
    While I'd be the first to agree that the degree of fiscal mismanagement of this nation's economy is beyond insane and have to admit that I see very little to admire in Barack Obama's presidency, the meme about Executive Order 13603 authorizing confiscation of any property and enslavement of the American public needs to be put to rest. See http://www.archives.gov/federal-register/executive-orders/2012.html#13603 E.O. 13603 is not much more than an updating of similar executive orders issued by prior presidents beginning with Dwight Eisenhower. In fact, in skimming it a few minutes ago, I didn't see anything drastically different from some of the prior related orders. E.g., it reflects that a bunch of agencies that were formerly either independent or under other departments are now under the newish Department of Homeland Security, whose Secretary now gets the authority formerly delegated to other department and agency heads. If blame must be cast, it belongs on the Congress that enacted the Defense Production Act of 1950, 50 U.S.C. 2061, et seq. The executive order does no more than obey that Act's instructions. For example there is a section authorizing pre-emption of manufacturing capacity of critical industries over any existing civilian contracts in the event of a national emergency, but that language is in the statute as well. But that power hasn't had much traction since Harry Truman tried to nationalize the steel industry to break a nationwide strike. The Supreme Court swatted down that effort as an abuse of a power that would be lawful in a true emergency, like another major. But even that semi-radical "survival" power is ameliorated by other provisions of the statute and the order that authorize loan guarantees for companies' construction and maintenance of critical productive capacity. Much of that has been implemented over the years as outright grants. So for example, many chemical manufacturing plants were built with Defense Production Act funds, with
Paul Merrell

Loopholes, Filing Failures, and Lax Enforcement: How the Foreign Agents Registration Ac... - 0 views

  • Why This Matters The Foreign Agents Registration Act requires American lobbyists working on behalf of foreign clients to disclose significantly more information about their activities than what is required of domestic lobbyists. This includes the actual documents used to influence policy makers, called informational materials. These materials include draft legislation, speeches, press releases and more, all created to influence U.S. policy. But the lobbyists do not always follow the letter of the law and enforcement by the Justice Department has been lax in recent years. Furthermore, the law itself seems to have loopholes that make enforcement difficult if not impossible. The Foreign Agents Registration Act is intended to bring transparency into the world of foreign lobbying. But when American lobbyists working on behalf of foreign interests fail to follow the law, or the Justice Department fails to enforce it, the American people are left in the dark.
  • Why This Matters The Foreign Agents Registration Act requires American lobbyists working on behalf of foreign clients to disclose significantly more information about their activities than what is required of domestic lobbyists. This includes the actual documents used to influence policy makers, called informational materials. These materials include draft legislation, speeches, press releases and more, all created to influence U.S. policy. But the lobbyists do not always follow the letter of the law and enforcement by the Justice Department has been lax in recent years. Furthermore, the law itself seems to have loopholes that make enforcement difficult if not impossible. The Foreign Agents Registration Act is intended to bring transparency into the world of foreign lobbying. But when American lobbyists working on behalf of foreign interests fail to follow the law, or the Justice Department fails to enforce it, the American people are left in the dark.
  • Executive Summary The Foreign Agents Registration Act (FARA) requires that all American citizens working to influence U.S. policy on behalf of foreign governments register with the Department of Justice and to disclose information on any and all political activity in which they engaged for foreign clients. This includes filing, within 48 hours, any informational materials disseminated to two or more people.
  • ...7 more annotations...
  • Table of Contents Executive SummaryIntroductionBackgroundWhat the Foreign Influence Database ShowsEgypt: A Case Study Of Foreign InfluenceSame-Day ContributionsSystemic Foreign InfluenceQuid Pro Quo or Coincidence?Foreign Money and the LawLax Compliance with and Enforcement of FARAEnforcementConclusionRecommendationsEndnotes
  • The law requires lobbyists for foreign interests to plainly and conspicuously identify themselves as such in any materials distributed in the course of their lobbying—for example, emails, other correspondence, or publications. We found that many documents filed with the Justice Department lack this identification statement; furthermore, many lobbyists admitted that they did not comply with this requirement. More than half (51 percent) of the registrants we examined in a sample from 2010 checked a box on a the semi-annual Justice Department questionnaire saying they had filed informational materials, and checked another box saying they had not met the legal requirement that they identify themselves in those materials as working on behalf of foreign interests. Toby Moffett, a former Member of Congress from Connecticut who is now Chairman of the Moffett Group and one of its registered lobbyists, told POGO that “Around the edges there’s a lot of loosey-goosey stuff going on. People representing foreign interests and not reporting.”[4] But even when lobbyists do report to the Justice Department, the information they provide is not easily accessible to the public. Astonishingly, informational materials are not available online, despite the fact that the Justice Department has an electronic filing system. Instead, these documents are kept in an office at the Justice Department that is only open for four hours each weekday. Hard copies of the documents are kept in folders that are often disorganized and susceptible to misfiling. This archaic system undermines the intended transparency of the law.
  • We set out to determine the extent to which lobbyists for foreign interests were filing lobbying materials at the Justice Department within the required time frame. Based on a review of filings made in 2012, in those instances where it was possible to answer the question, POGO estimates that almost half—46 percent—were filed late. Fifteen percent were filed more than 30 business days after they were distributed, and 12 percent were filed more than 100 business days after they were distributed. In many instances, the Justice Department would be hard pressed to enforce the filing deadline. Based on the records the Department maintains to enforce the law, we found that in more than a quarter (26 percent) of the 2012 filings, it was impossible to determine whether the lobbyists complied. For example, in many cases, the records did not show when the lobbyists disseminated the materials to the targets of their lobbying. In a glaring omission, the law does not require lobbyists to provide that information. Without it, there may be no way for the government or the public to know whether lobbying materials were filed on time.
  • Though federal law bars foreign money from U.S. political campaigns, there appears to be a gray area in the law that can let in such money indirectly. POGO found many instances in which members of lobbying firms made political contributions to Members of Congress on the same day that those firms were lobbying the Members of Congress or their legislative staffs on behalf of foreign clients.[1] Lobbyists who fail to comply with certain FARA requirements may have little to fear from the Justice Department. “The cornerstone of the Registration Unit’s enforcement efforts is encouraging voluntary compliance,” a Justice Department website says.[2] When lobbyists do not voluntarily comply, the Justice Department rarely uses one of the key tools at its disposal to enforce the law—seeking a court injunction. A representative of the Department’s FARA unit told POGO: “While the FARA statute and regulations authorize the pursuit of formal legal proceedings, such as injunctive remedy options, the FARA Unit [has] not pursued injunctive remedy options recently and has instead utilized other mechanisms to achieve compliance.”[3] It appears that some registered foreign agents have been distributing materials but not filing them with the Justice Department. It’s unclear the extent to which that illustrates a lack of compliance with the law or loopholes in the law. In the process of researching this report, POGO noticed that many more lobbyists were registering as foreign agents than had filed informational materials that we could locate at the FARA office. To determine what was happening, we looked at a sampling of questionnaires that the Justice Department requires registered agents to complete every six months. Some checked one box indicating they had distributed materials and another box stating they did not file them with the FARA office.
  • The Project On Government Oversight examined thousands of these materials spanning four years, as well as additional public records related to the Justice Department’s oversight of lobbyists for foreign interests. We found that lobbyists for foreign interests have routinely failed to comply with the law—a failure that prevents journalists and watchdogs from scrutinizing the lobbying activities while foreign interests are trying to influence U.S. policy. We found a pattern of lax enforcement of FARA requirements by the Justice Department. We found that the Justice Department office responsible for administering the law is a record-keeping mess. And we found loopholes in the law that often makes it difficult if not impossible for the government to police compliance or to discipline lobbyists who fail to comply. Here are some highlights of our investigation:
  • When lobbyists for foreign interests do not follow the law, when the U.S. government fails to enforce it, and when the Justice Department makes it difficult for the American people to access records to which they are legally entitled, the public is left in the dark. To bring more transparency to this opaque realm, POGO has made four years of informational materials available for the first time online with our Foreign Influence Database, allowing the public to see how lobbyists attempt to influence American policies on behalf of their foreign clients.
  • With the release of the Foreign Influence Database, the Project On Government Oversight (POGO) is making years of documents from this key set of FARA filings electronically available for the first time. The materials were previously only available in hard copy at the FARA Registration Unit in Washington, DC, which is only open to the public from 11am to 3pm on weekdays.[12] In this digital age it is surprising that these materials could not be read online and are instead stored in file folders, where they are disorganized and susceptible to misfiling. Even those that were electronically filed by the registrants are not available to the public in an electronic format. POGO’s database includes informational materials filed in 2009, 2010, 2011, and 2012.[13]
  •  
    POGO does thorough work and doesn't let up until it gets results. Forcing DoJ to puts its foreign agents registration materials online should be a fairly trivial battle. The real war, though, will be forcing better enforcement. The new database is at http://www.pogo.org/tools-and-data/foreign-influence-database/ I punched up the word "Israel" and came up with 113 documents in the search results. Each search hit lists the name of the nation involved that the lobbying was done for. Of those 113 document hits, only two were for the nation of Israel, both for its Ministry of Tourism. The rest were by other nations who had mentioned Israel in their lobbying materials.  Now that is fairly incredible, given that Israel outright controls Congress when it comes to Middle East policy.  The last administration to attempt to do something about Israeli lobbyists not registering was the the Kennedy Administration. The result was that the major Israeli lobbying group disbanded and was promptly reformed under a new corporate charter and name. That was the very last attempt at enforcing the Foreign Agents Registration Act against Israel's lobbyists in the U.S., despite the fact that the reformed group, AIPAC, has even been caught more than once being passed highly classified U.S. documents by double agents working inside the U.S. military establishment. The leakers went to prison but the AIPACers were never prosecuted. AIPAC rules.  
1 - 20 of 33 Next ›
Showing 20 items per page