Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "Due-Process" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Victory for Users: Librarian of Congress Renews and Expands Protections for Fair Uses | Electronic Frontier Foundation - 0 views

  • The new rules for exemptions to copyright's DRM-circumvention laws were issued today, and the Librarian of Congress has granted much of what EFF asked for over the course of months of extensive briefs and hearings. The exemptions we requested—ripping DVDs and Blurays for making fair use remixes and analysis; preserving video games and running multiplayer servers after publishers have abandoned them; jailbreaking cell phones, tablets, and other portable computing devices to run third party software; and security research and modification and repairs on cars—have each been accepted, subject to some important caveats.
  • The exemptions are needed thanks to a fundamentally flawed law that forbids users from breaking DRM, even if the purpose is a clearly lawful fair use. As software has become ubiquitous, so has DRM.  Users often have to circumvent that DRM to make full use of their devices, from DVDs to games to smartphones and cars. The law allows users to request exemptions for such lawful uses—but it doesn’t make it easy. Exemptions are granted through an elaborate rulemaking process that takes place every three years and places a heavy burden on EFF and the many other requesters who take part. Every exemption must be argued anew, even if it was previously granted, and even if there is no opposition. The exemptions that emerge are limited in scope. What is worse, they only apply to end users—the people who are actually doing the ripping, tinkering, jailbreaking, or research—and not to the people who make the tools that facilitate those lawful activities. The section of the law that creates these restrictions—the Digital Millennium Copyright Act's Section 1201—is fundamentally flawed, has resulted in myriad unintended consequences, and is long past due for reform or removal altogether from the statute books. Still, as long as its rulemaking process exists, we're pleased to have secured the following exemptions.
  • The new rules are long and complicated, and we'll be posting more details about each as we get a chance to analyze them. In the meantime, we hope each of these exemptions enable more exciting fair uses that educate, entertain, improve the underlying technology, and keep us safer. A better long-terms solution, though, is to eliminate the need for this onerous rulemaking process. We encourage lawmakers to support efforts like the Unlocking Technology Act, which would limit the scope of Section 1201 to copyright infringements—not fair uses. And as the White House looks for the next Librarian of Congress, who is ultimately responsible for issuing the exemptions, we hope to get a candidate who acts—as a librarian should—in the interest of the public's access to information.
Paul Merrell

America, the Election, and the Dismal Tide « LobeLog - 0 views

  • I thought about that March night as the election results rolled in, as the New York Times forecast showed Hillary Clinton’s chances of winning the presidency plummet from about 80% to less than 5%, while Trump’s fortunes skyrocketed by the minute. As Clinton’s future in the Oval Office evaporated, leaving only a whiff of her stale dreams, I saw all the foreign-policy certainties, all the hawkish policies and military interventions, all the would-be bin Laden raids and drone strikes she’d preside over as commander-in-chief similarly vanish into the ether. With her failed candidacy went the no-fly escalation in Syria that she was sure to pursue as president with the vigor she had applied to the disastrous Libyan intervention of 2011 while secretary of state.  So, too, went her continued pursuit of the now-nameless war on terror, the attendant “gray-zone” conflicts — marked by small contingents of U.S. troops, drone strikes, and bombing campaigns — and all those munitions she would ship to Saudi Arabia for its war in Yemen. As the life drained from Clinton’s candidacy, I saw her rabid pursuit of a new Cold War start to wither and Russo-phobic comparisons of Putin’s rickety Russian petro-state to Stalin’s Soviet Union begin to die.  I saw the end, too, of her Iron Curtain-clouded vision of NATO, of her blind faith in an alliance more in line with 1957 than 2017. As Clinton’s political fortunes collapsed, so did her Israel-Palestine policy — rooted in the fiction that American and Israeli security interests overlap — and her commitment to what was clearly an unworkable “peace process.”  Just as, for domestic considerations, she would blindly support that Middle Eastern nuclear power, so was she likely to follow President Obama’s trillion-dollarpath to modernizing America’s nuclear arsenal.  All that, along with her sure-to-be-gargantuan military budget requests, were scattered to the winds by her ringing defeat.
  • Clinton’s foreign policy future had been a certainty.  Trump’s was another story entirely.  He had, for instance, called for a raft of military spending: growing the Army and Marines to a ridiculous size, building a Navy to reach a seemingly arbitrary and budget-busting number of ships, creating a mammoth air armada of fighter jets, pouring money into a missile defense boondoggle, and recruiting a legion of (presumably overweight) hackers to wage cyber war.  All of it to be paid for by cutting unnamed waste, ending unspecified “federal programs,” or somehow conjuring up dollars from hither and yon.  But was any of it serious?  Was any of it true?  Would President Trump actually make good on the promises of candidate Trump?  Or would he simply bark “Wrong!” when somebody accused him of pledging to field an army of 540,000 active duty soldiers or build a Navy of 350 ships. Would Trump actually attempt to implement his plan to defeat ISIS — that is, “bomb the shit out of them” and then “take the oil” of Iraq?  Or was that just the bellicose bluster of the campaign trail?  Would he be the reckless hawk Clinton promised to be, waging wars like the Libyan intervention?  Or would he follow the dictum of candidate Trump who said, “The current strategy of toppling regimes, with no plan for what to do the day after, only produces power vacuums that are filled by terrorists.” Outgoing representative Randy Forbes of Virginia, a contender to be secretary of the Navy in the new administration, recently said that the president elect would employ “an international defense strategy that is driven by the Pentagon and not by the political National Security Council… Because if you look around the globe, over the last eight years, the National Security Council has been writing that. And find one country anywhere that we are better off than we were eight years [ago], you cannot find it.”
  • Such a plan might actually blunt armed adventurism, since it was war-weary military officials who reportedly pushed back against President Obama’s plans to escalate Iraq War 3.0.  According to some Pentagon-watchers, a potentially hostile bureaucracy might also put the brakes on even fielding a national security team in a timely fashion. While Wall Street investors seemed convinced that the president elect would be good for defense industry giants like Lockheed Martin and General Dynamics, whose stocks surged in the wake of Trump’s win, it’s unclear whether that indicates a belief in more armed conflicts or simply more bloated military spending. Under President Obama, the U.S. has waged war in or carried out attacks on at least eight nations — Afghanistan, Iran, Iraq, Pakistan, Somalia, Yemen, Libya, and Syria.  A Clinton presidency promised more, perhaps markedly more, of the same — an attitude summed up in her infamous comment about the late Libyan autocrat Muammar Gaddafi: “We came, we saw, he died.”  Trump advisor Senator Jeff Sessions said, “Trump does not believe in war. He sees war as bad, destructive, death and a wealth destruction.”  Of course, Trump himself said he favors committing war crimes like torture and murder.  He’s also suggested that he would risk war over the sort of naval provocations — like Iranian ships sailing close to U.S. vessels — that are currently met with nothing graver than warning shots. So there’s good reason to assume Trump will be a Clintonesque hawk or even worse, but some reason to believe — due to his propensity for lies, bluster, and backing down — that he could also turn out to be less bellicose.
  • ...3 more annotations...
  • Given his penchant for running businesses into the ground and for economic proposals expected to rack up trillions of dollars in debt, it’s possible that, in the end, Trump will inadvertently cripple the U.S. military.  And given that the government is, in many ways, a national security state bonded with a mass of money and orbited by satellite departments and agencies of far lesser import, Trump could even kneecap the entire government.  If so, what could be catastrophic for Americans — a battered, bankrupt United States — might, ironically, bode well for the wider world.
  • At the time, I told my questioner just what I thought a Hillary Clinton presidency might mean for America and the world: more saber-rattling, more drone strikes, more military interventions, among other things.  Our just-ended election aborted those would-be wars, though Clinton’s legacy can still be seen, among other places, in the rubble of Iraq, the battered remains of Libya, and the faces of South Sudan’s child soldiers.  Donald Trump has the opportunity to forge a new path, one that could be marked by bombast instead of bombs.  If ever there was a politician with the ability to simply declare victory and go home — regardless of the facts on the ground — it’s him.  Why go to war when you can simply say that you did, big league, and you won? The odds, of course, are against this.  The United States has been embroiled in foreign military actions, almost continuously, since its birth and in 64 conflicts, large and small, according to the military, in the last century alone.  It’s a country that, since 9/11, has been remarkably content to wage winless, endless wars with little debate or popular outcry.  It’s a country in which Barack Obama won election, in large measure, due to dissatisfaction with the prior commander-in-chief’s signature war and then, after winning a Nobel Peace Prize and overseeing the withdrawal of troops from Iraq, reengaged in an updated version of that very same war — bequeathing it now to Donald J. Trump. “This Trump.  He’s a crazy man!” the African aid worker insisted to me that March night.  “He says some things and you wonder: Are you going to be president?  Really?”  It turns out the answer is yes. “It can’t happen, can it?” That question still echoes in my mind.
  • I know all the things that now can’t happen, Clinton’s wars among them. The Trump era looms ahead like a dark mystery, cold and hard.  We may well be witnessing the rebirth of a bitter nation, the fruit of a land poisoned at its root by evils too fundamental to overcome; a country exceptional for its squandered gifts and forsaken providence, its shattered promises and moral squalor. “It can’t happen, can it?” Indeed, my friend, it just did.
Paul Merrell

The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) | Threat Level | Wired.com - 0 views

    • Paul Merrell
       
      There goes the neighborhood; the Feds are moving in. 
  • In the process—and for the first time since Watergate and the other scandals of the Nixon administration—the NSA has turned its surveillance apparatus on the US and its citizens. It has established listening posts throughout the nation to collect and sift through billions of email messages and phone calls, whether they originate within the country or overseas. It has created a supercomputer of almost unimaginable speed to look for patterns and unscramble codes. Finally, the agency has begun building a place to store all the trillions of words and thoughts and whispers captured in its electronic net. And, of course, it’s all being done in secret.
  • According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US. The upshot, according to this official: “Everybody’s a target; everybody with communication is a target.
  • ...8 more annotations...
  • as a 2007 Department of Defense report puts it, the Pentagon is attempting to expand its worldwide communications network, known as the Global Information Grid, to handle yottabytes (1024 bytes) of data. (A yottabyte is a septillion bytes—so large that no one has yet coined a term for the next higher magnitude.) It needs that capacity because, according to a recent report by Cisco, global Internet traffic will quadruple from 2010 to 2015, reaching 966 exabytes per year. (A million exabytes equal a yottabyte.
  • The data stored in Bluffdale will naturally go far beyond the world’s billions of public web pages. The NSA is more interested in the so-called invisible web, also known as the deep web or deepnet—data beyond the reach of the public. This includes password-protected data, US and foreign government communications, and noncommercial file-sharing between trusted peers.
  • The broad outlines of the so-called warrantless-wiretapping program have long been exposed—how the NSA secretly and illegally bypassed the Foreign Intelligence Surveillance Court, which was supposed to oversee and authorize highly targeted domestic eavesdropping; how the program allowed wholesale monitoring of millions of American phone calls and email. In the wake of the program’s exposure, Congress passed the FISA Amendments Act of 2008, which largely made the practices legal. Telecoms that had agreed to participate in the illegal activity were granted immunity from prosecution and lawsuits. What wasn’t revealed until now, however, was the enormity of this ongoing domestic spying program. For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail.
  • one of the deepest secrets of the Stellar Wind program—again, never confirmed until now—was that the NSA gained warrantless access to AT&T’s vast trove of domestic and international billing records, detailed information about who called whom in the US and around the world. As of 2007, AT&T had more than 2.8 trillion records housed in a database at its Florham Park, New Jersey, complex. Verizon was also part of the program
  • the NSA succeeded in building an even faster supercomputer. “They made a big breakthrough,” says another former senior intelligence official, who helped oversee the program. The NSA’s machine was likely similar to the unclassified Jaguar, but it was much faster out of the gate, modified specifically for cryptanalysis and targeted against one or more specific algorithms, like the AES.
  • The breakthrough was enormous, says the former official, and soon afterward the agency pulled the shade down tight on the project, even within the intelligence community and Congress. “Only the chairman and vice chairman and the two staff directors of each intelligence committee were told about it,” he says. The reason? “They were thinking that this computing breakthrough was going to give them the ability to crack current public encryption.”
  • But the real competition will take place in the classified realm. To secretly develop the new exaflop (or higher) machine by 2018, the NSA has proposed constructing two connecting buildings, totaling 260,000 square feet, near its current facility on the East Campus of Oak Ridge. Called the Multiprogram Computational Data Center,
  • n the meantime Cray is working on the next step for the NSA, funded in part by a $250 million contract with the Defense Advanced Research Projects Agency. It’s a massively parallel supercomputer called Cascade, a prototype of which is due at the end of 2012. Its development will run largely in parallel with the unclassified effort for the DOE and other partner agencies. That project, due in 2013, will upgrade the Jaguar XT5 into an XK6, codenamed Titan, upping its speed to 10 to 20 petaflops.
Paul Merrell

Popular Security Software Came Under Relentless NSA and GCHQ Attacks - The Intercept - 0 views

  • The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate networks, according to documents from NSA whistleblower Edward Snowden. The spy agencies have reverse engineered software products, sometimes under questionable legal authority, and monitored web and email traffic in order to discreetly thwart anti-virus software and obtain intelligence from companies about security software and users of such software. One security software maker repeatedly singled out in the documents is Moscow-based Kaspersky Lab, which has a holding registered in the U.K., claims more than 270,000 corporate clients, and says it protects more than 400 million people with its products. British spies aimed to thwart Kaspersky software in part through a technique known as software reverse engineering, or SRE, according to a top-secret warrant renewal request. The NSA has also studied Kaspersky Lab’s software for weaknesses, obtaining sensitive customer information by monitoring communications between the software and Kaspersky servers, according to a draft top-secret report. The U.S. spy agency also appears to have examined emails inbound to security software companies flagging new viruses and vulnerabilities.
  • The efforts to compromise security software were of particular importance because such software is relied upon to defend against an array of digital threats and is typically more trusted by the operating system than other applications, running with elevated privileges that allow more vectors for surveillance and attack. Spy agencies seem to be engaged in a digital game of cat and mouse with anti-virus software companies; the U.S. and U.K. have aggressively probed for weaknesses in software deployed by the companies, which have themselves exposed sophisticated state-sponsored malware.
  • The requested warrant, provided under Section 5 of the U.K.’s 1994 Intelligence Services Act, must be renewed by a government minister every six months. The document published today is a renewal request for a warrant valid from July 7, 2008 until January 7, 2009. The request seeks authorization for GCHQ activities that “involve modifying commercially available software to enable interception, decryption and other related tasks, or ‘reverse engineering’ software.”
  • ...9 more annotations...
  • The NSA, like GCHQ, has studied Kaspersky Lab’s software for weaknesses. In 2008, an NSA research team discovered that Kaspersky software was transmitting sensitive user information back to the company’s servers, which could easily be intercepted and employed to track users, according to a draft of a top-secret report. The information was embedded in “User-Agent” strings included in the headers of Hypertext Transfer Protocol, or HTTP, requests. Such headers are typically sent at the beginning of a web request to identify the type of software and computer issuing the request.
  • According to the draft report, NSA researchers found that the strings could be used to uniquely identify the computing devices belonging to Kaspersky customers. They determined that “Kaspersky User-Agent strings contain encoded versions of the Kaspersky serial numbers and that part of the User-Agent string can be used as a machine identifier.” They also noted that the “User-Agent” strings may contain “information about services contracted for or configurations.” Such data could be used to passively track a computer to determine if a target is running Kaspersky software and thus potentially susceptible to a particular attack without risking detection.
  • Another way the NSA targets foreign anti-virus companies appears to be to monitor their email traffic for reports of new vulnerabilities and malware. A 2010 presentation on “Project CAMBERDADA” shows the content of an email flagging a malware file, which was sent to various anti-virus companies by François Picard of the Montréal-based consulting and web hosting company NewRoma. The presentation of the email suggests that the NSA is reading such messages to discover new flaws in anti-virus software. Picard, contacted by The Intercept, was unaware his email had fallen into the hands of the NSA. He said that he regularly sends out notification of new viruses and malware to anti-virus companies, and that he likely sent the email in question to at least two dozen such outfits. He also said he never sends such notifications to government agencies. “It is strange the NSA would show an email like mine in a presentation,” he added.
  • The NSA presentation goes on to state that its signals intelligence yields about 10 new “potentially malicious files per day for malware triage.” This is a tiny fraction of the hostile software that is processed. Kaspersky says it detects 325,000 new malicious files every day, and an internal GCHQ document indicates that its own system “collect[s] around 100,000,000 malware events per day.” After obtaining the files, the NSA analysts “[c]heck Kaspersky AV to see if they continue to let any of these virus files through their Anti-Virus product.” The NSA’s Tailored Access Operations unit “can repurpose the malware,” presumably before the anti-virus software has been updated to defend against the threat.
  • The Project CAMBERDADA presentation lists 23 additional AV companies from all over the world under “More Targets!” Those companies include Check Point software, a pioneering maker of corporate firewalls based Israel, whose government is a U.S. ally. Notably omitted are the American anti-virus brands McAfee and Symantec and the British company Sophos.
  • As government spies have sought to evade anti-virus software, the anti-virus firms themselves have exposed malware created by government spies. Among them, Kaspersky appears to be the sharpest thorn in the side of government hackers. In the past few years, the company has proven to be a prolific hunter of state-sponsored malware, playing a role in the discovery and/or analysis of various pieces of malware reportedly linked to government hackers, including the superviruses Flame, which Kaspersky flagged in 2012; Gauss, also detected in 2012; Stuxnet, discovered by another company in 2010; and Regin, revealed by Symantec. In February, the Russian firm announced its biggest find yet: the “Equation Group,” an organization that has deployed espionage tools widely believed to have been created by the NSA and hidden on hard drives from leading brands, according to Kaspersky. In a report, the company called it “the most advanced threat actor we have seen” and “probably one of the most sophisticated cyber attack groups in the world.”
  • Hacks deployed by the Equation Group operated undetected for as long as 14 to 19 years, burrowing into the hard drive firmware of sensitive computer systems around the world, according to Kaspersky. Governments, militaries, technology companies, nuclear research centers, media outlets and financial institutions in 30 countries were among those reportedly infected. Kaspersky estimates that the Equation Group could have implants in tens of thousands of computers, but documents published last year by The Intercept suggest the NSA was scaling up their implant capabilities to potentially infect millions of computers with malware. Kaspersky’s adversarial relationship with Western intelligence services is sometimes framed in more sinister terms; the firm has been accused of working too closely with the Russian intelligence service FSB. That accusation is partly due to the company’s apparent success in uncovering NSA malware, and partly due to the fact that its founder, Eugene Kaspersky, was educated by a KGB-backed school in the 1980s before working for the Russian military.
  • Kaspersky has repeatedly denied the insinuations and accusations. In a recent blog post, responding to a Bloomberg article, he complained that his company was being subjected to “sensationalist … conspiracy theories,” sarcastically noting that “for some reason they forgot our reports” on an array of malware that trace back to Russian developers. He continued, “It’s very hard for a company with Russian roots to become successful in the U.S., European and other markets. Nobody trusts us — by default.”
  • Documents published with this article: Kaspersky User-Agent Strings — NSA Project CAMBERDADA — NSA NDIST — GCHQ’s Developing Cyber Defence Mission GCHQ Application for Renewal of Warrant GPW/1160 Software Reverse Engineering — GCHQ Reverse Engineering — GCHQ Wiki Malware Analysis & Reverse Engineering — ACNO Skill Levels — GCHQ
Gary Edwards

"The Burning Platform" by James Quinn. FSO Editorial 02/18/2009 - 0 views

  • “Basically what happens is that after a period of time, economies go through a long-term debt cycle -- a dynamic that is self-reinforcing, in which people finance their spending by borrowing and debts rise relative to incomes and, more accurately, debt-service payments rise relative to incomes. At cycle peaks, assets are bought on leverage at high-enough prices that the cash flows they produce aren't adequate to service the debt. The incomes aren't adequate to service the debt. Then begins the reversal process, and that becomes self-reinforcing, too. In the simplest sense, the country reaches the point when it needs a debt restructuring. We will go through a giant debt-restructuring, because we either have to bring debt-service payments down so they are low relative to incomes -- the cash flows that are being produced to service them -- or we are going to have to raise incomes by printing a lot of money.
  •  
    As Congressional moron after Congressional moron goes on the usual Sunday talk show circuit and says we must stop home prices from falling, I wonder whether these people took basic math in high school. Are they capable of looking at a chart and understanding a long-term average? The median value of a U.S. home in 2000 was $119,600. It peaked at $221,900 in 2006. Historically, home prices have risen annually in line with CPI. If they had followed the long-term trend, they would have increased by 17% to $140,000. Instead, they skyrocketed by 86% due to Alan Greenspan's irrational lowering of interest rates to 1%, the criminal pushing of loans by lowlife mortgage brokers, the greed and hubris of investment bankers and the foolishness and stupidity of home buyers. It is now 2009 and the median value should be $150,000 based on historical precedent. The median value at the end of 2008 was $180,100. Therefore, home prices are still 20% overvalued. Long-term averages are created by periods of overvaluation followed by periods of undervaluation. Prices need to fall 20% and could fall 30%. Instead of allowing the housing market to correct to its fair value, President Obama and Barney Frank will attempt to "mitigate" foreclosures. Mr. Frank has big plans for your tax dollars, "We may need more than $50 billion for foreclosure [mitigation]". What this means is that you will be making your monthly mortgage payment and in addition you will be making a $100 payment per month for a deadbeat who bought more house than they could afford, is still watching a 52 inch HDTV, still eating in their perfect kitchens with granite countertops and stainless steel appliances. Barney thinks he can reverse the law of supply and demand by throwing your money at the problem. He will succeed in wasting billions of tax dollars and home prices will still fall 20% to 30%. Unsustainably high home prices can not be sustained. I would normally say that even a 3rd grader could understand this conce
Paul Merrell

ISIS: Made in Washington, Riyadh - and Tel Aviv by Justin Raimondo -- Antiwar.com - 0 views

  • The Islamic State in Iraq and Syria (ISIS) is being touted as the newest "threat" to the American homeland: hysterics have pointed to Chicago as the locus of their interest, and we are told by everyone from the President on down that if we don’t attack them – i.e. go back into Iraq (and even venture into Syria) to root them out – they’ll soon show up on American shores.
  • If we step back from the hysteria generated by the beheading of US journalist James Foley, what’s clear is that this new bogeyman is the creation of the United States and its allies in the region. ISIS didn’t just arise out of the earth like some Islamist variation on the fabled Myrmidons: they needed money, weapons, logistics, propaganda facilities, and international connections to reach the relatively high level of organization and lethality they seem to have achieved in such a short period of time. Where did they get these assets? None of this is any secret: Saudi Arabia, Qatar, and the rest of the oil-rich Gulf states have been backing them all the way. Prince Bandar al-Sultan, until recently the head of the Kingdom’s intelligence agency – and still the chief of its National Security Council – has been among their biggest backers. Qatar and the Gulf states have also been generous in their support for the Syrian jihadists who were too radical for the US to openly back. Although pressure from Washington – only recently exerted – has reportedly forced them to cut off the aid, ISIS is now an accomplished fact – and how can anyone say that support has entirely evaporated instead of merely going underground?
  • Washington’s responsibility for the success of ISIS is less direct, but no less damning. The US was in a de facto alliance with the groups that merged to form ISIS ever since President Barack Obama declared Syria’s Bashar al-Assad "must go" – and Washington started funding Syrian rebel groups whose composition and leadership kept changing. By funding the Free Syrian Army (FSA), our "vetted" Syrian Islamists, this administration has actively worked to defeat the only forces capable of rooting out ISIS from its Syrian nest – Assad’s Ba’athist government. Millions of dollars in overt aid – and who knows how much covertly? – were pumped into the FSA. How much of that seeped into the coffers of ISIS when constantly forming and re-forming chameleon-like rebel groups defected from the FSA? These defectors didn’t just go away: they joined up with more radical – and militarily effective – Islamist militias, some of which undoubtedly found their way to ISIS. How many ISIS cadres who started out in the FSA were trained and equipped by American "advisors" in neighboring Jordan? We’ll never know the exact answer to that question, but the number is very likely not zero – and this Mother Jones piece shows that, at least under the Clinton-Petraeus duo, the "vetting" process was a joke. Furthermore, Senator Rand Paul (R-Kentucky) may have been on to something when he confronted Hillary with the contention that some of the arms looted from Gaddafi’s arsenals may well have reached the Syrian rebels. There was, after all, the question of where that mysterious "charity ship," the Al Entisar, carrying "humanitarian aid" to the Syrian rebels headquartered in Turkey, sailed from.
  • ...3 more annotations...
  • In a recent public event held at the Aspen Institute, former Israeli ambassador to the US Michael Oren bluntly stated that in any struggle between the Sunni jihadists and their Iranian Shi’ite enemies, the former are the "lesser evil." They’re all "bad guys," says Oren, but "we always wanted Bashar Assad to go, we always preferred the bad guys who weren’t backed by Iran to the bad guys who were backed by Iran." Last year, Sima Shine, Israel’s Minister of Strategic Affairs, declared: "The alternative, whereby [Assad falls and] Jihadists flock to Syria, is not good. We have no good options in Syria. But Assad remaining along with the Iranians is worse. His ouster would exert immense pressure on Iran." None of this should come as much of a surprise to anyone who has been following Israel’s machinations in the region. It has long been known that the Israelis have been standing very close to the sidelines of the Syrian civil war, gloating and hoping for "no outcome," as this New York Times piece put it.
  • Secondly, the open backing by the US of particular Syrian rebel groups no doubt discredited them in the eyes of most Islamist types, driving them away from the FSA and into the arms of ISIS. When it became clear Washington wasn’t going to provide air support for rebel actions on the ground, these guys left the FSA in droves – and swelled the ranks of groups that eventually coalesced into ISIS. Thirdly, the one silent partner in all this has been the state of Israel. While there is no evidence of direct Israeli backing, the public statements of some top Israeli officials lead one to believe Tel Aviv has little interest in stopping the ISIS threat – except, of course, to urge Washington to step deeper into the Syrian quagmire.
  • Israel’s goal in the region has been to gin up as much conflict and chaos as possible, keeping its Islamic enemies divided, making it impossible for any credible challenge to arise among its Arab neighbors – and aiming the main blow at Tehran. As Ambassador Oren so brazenly asserted – while paying lip service to the awfulness of ISIS and al-Qaeda – their quarrel isn’t really with the Arabs, anyway – it’s with the Persians, whom they fear and loathe, and whose destruction has been their number one objective since the days of Ariel Sharon. Why anyone is shocked that our Middle Eastern allies have been building up Sunni radicals in the region is beyond me – because this has also been de facto US policy since the Bush administration, which began recruiting American assets in the Sunni region as the linchpin of the Iraqi "surge." This was part and parcel of the so-called "Sunni turn," or "redirection," in Seymour Hersh’s phrase, which, as I warned in 2006, would become Washington’s chosen strategy for dealing with what they called the "Shia crescent" – the crescent-shaped territory spanning Iran, Iraq, Syria, and parts of Lebanon under Hezbollah’s control, which the neocons began pointing to as the Big New Threat shortly after Saddam Hussein’s defeat.
  •  
    If one were to attempt to write the most damning yet throughly referenced report on U.S. involvement with ISIL, this manuscript would make a very good first draft.  But probably unintentionally, the author gives less credit to Israel than it is due. At least twice (and I think more but would have to check), the Israeli Air Force has struck Syria, destroying Russian heavy weaponry, missiles capable of reaching Israel, being delivered to the Lebanonese Hezbollah in Syria. Hesbollah is fighting side-by-side with the Syrian government forces in Syria. So Israel has had a direct and overt hand in the Syrian war. 
Paul Merrell

Congress Is Irrelevant on Mass Surveillance. Here's What Matters Instead. - The Intercept - 0 views

  • The “USA Freedom Act”—the proponents of which were heralding as “NSA reform” despite its suffocatingly narrow scope—died in the august U.S. Senate last night when it attracted only 58 of the 60 votes needed to close debate and move on to an up-or-down vote. All Democratic and independent senators except one (Bill Nelson of Florida) voted in favor of the bill, as did three tea-party GOP Senators (Ted Cruz, Mike Lee, and Dean Heller). One GOP Senator, Rand Paul, voted against it on the ground that it did not go nearly far enough in reining in the NSA. On Monday, the White House had issued a statement “strongly supporting” the bill. The “debate” among the Senators that preceded the vote was darkly funny and deeply boring, in equal measure. The black humor was due to the way one GOP senator after the next—led by ranking intelligence committee member Saxby Chambliss of Georgia (pictured above)—stood up and literally screeched about 9/11 and ISIS over and over and over, and then sat down as though they had made a point.
  • So the pro-NSA Republican senators were actually arguing that if the NSA were no longer allowed to bulk-collect the communication records of Americans inside the U.S., then ISIS would kill you and your kids. But because they were speaking in an empty chamber and only to their warped and insulated D.C. circles and sycophantic aides, there was nobody there to cackle contemptuously or tell them how self-evidently moronic it all was. So they kept their Serious Faces on like they were doing The Nation’s Serious Business, even though what was coming out of their mouths sounded like the demented ramblings of a paranoid End is Nigh cult. The boredom of this spectacle was simply due to the fact that this has been seen so many times before—in fact, every time in the post-9/11 era that the U.S. Congress pretends publicly to debate some kind of foreign policy or civil liberties bill. Just enough members stand up to scream “9/11″ and “terrorism” over and over until the bill vesting new powers is passed or the bill protecting civil liberties is defeated.
  • Eight years ago, when this tawdry ritual was still a bit surprising to me, I live-blogged the 2006 debate over passage of the Military Commissions Act, which, with bipartisan support, literally abolished habeas corpus rights established by the Magna Carta by sanctioning detention without charges or trial. (My favorite episode there was when GOP Sen. Arlen Specter warned that “what the bill seeks to do is set back basic rights by some nine hundred years,” and then voted in favor of its enactment.) In my state of naive disbelief, as one senator after the next thundered about the “message we are sending” to “the terrorists,” I wrote: “The quality of the ‘debate’ on the Senate floor is so shockingly (though appropriately) low and devoid of substance that it is hard to watch.” So watching last night’s Senate debate was like watching a repeat of some hideously shallow TV show. The only new aspect was that the aging Al Qaeda villain has been rather ruthlessly replaced by the show’s producers with the younger, sleeker ISIS model. Showing no gratitude at all for the years of value it provided these senators, they ignored the veteran terror group almost completely in favor of its new replacement. And they proceeded to save a domestic surveillance program clearly unpopular among those they pretend to represent.
  • ...8 more annotations...
  • Ever since the Snowden reporting began and public opinion (in both the U.S. and globally) began radically changing, the White House’s strategy has been obvious. It’s vintage Obama: Enact something that is called “reform”—so that he can give a pretty speech telling the world that he heard and responded to their concerns—but that in actuality changes almost nothing, thus strengthening the very system he can pretend he “changed.” That’s the same tactic as Silicon Valley, which also supported this bill: Be able to point to something called “reform” so they can trick hundreds of millions of current and future users around the world into believing that their communications are now safe if they use Facebook, Google, Skype and the rest. In pretty much every interview I’ve done over the last year, I’ve been asked why there haven’t been significant changes from all the disclosures. I vehemently disagree with the premise of the question, which equates “U.S. legislative changes” with “meaningful changes.” But it has been clear from the start that U.S. legislation is not going to impose meaningful limitations on the NSA’s powers of mass surveillance, at least not fundamentally. Those limitations are going to come from—are now coming from —very different places:
  • All of that illustrates what is, to me, the most important point from all of this: the last place one should look to impose limits on the powers of the U.S. government is . . . the U.S. government. Governments don’t walk around trying to figure out how to limit their own power, and that’s particularly true of empires. The entire system in D.C. is designed at its core to prevent real reform. This Congress is not going to enact anything resembling fundamental limits on the NSA’s powers of mass surveillance. Even if it somehow did, this White House would never sign it. Even if all that miraculously happened, the fact that the U.S. intelligence community and National Security State operates with no limits and no oversight means they’d easily co-opt the entire reform process. That’s what happened after the eavesdropping scandals of the mid-1970s led to the establishment of congressional intelligence committees and a special FISA “oversight” court—the committees were instantly captured by putting in charge supreme servants of the intelligence community like Senators Dianne Feinstein and Chambliss, and Congressmen Mike Rogers and “Dutch” Ruppersberger, while the court quickly became a rubber stamp with subservient judges who operate in total secrecy.
  • There is a real question about whether the defeat of this bill is good, bad, or irrelevant. To begin with, it sought to change only one small sliver of NSA mass surveillance (domestic bulk collection of phone records under section 215 of the Patriot Act) while leaving completely unchanged the primary means of NSA mass surveillance, which takes place under section 702 of the FISA Amendments Act, based on the lovely and quintessentially American theory that all that matters are the privacy rights of Americans (and not the 95 percent of the planet called “non-Americans”). There were some mildly positive provisions in the USA Freedom Act: the placement of “public advocates” at the FISA court to contest the claims of the government; the prohibition on the NSA holding Americans’ phone records, requiring instead that they obtain FISA court approval before seeking specific records from the telecoms (which already hold those records for at least 18 months); and reducing the agency’s “contact chaining” analysis from three hops to two. One could reasonably argue (as the ACLU and EFF did) that, though woefully inadequate, the bill was a net-positive as a first step toward real reform, but one could also reasonably argue, as Marcy Wheeler has with characteristic insight, that the bill is so larded with ambiguities and fundamental inadequacies that it would forestall better options and advocates for real reform should thus root for its defeat.
  • 1) Individuals refusing to use internet services that compromise their privacy.
  • 2) Other countries taking action against U.S. hegemony over the internet.
  • 4) Greater individual demand for, and use of, encryption.
  • 3) U.S. court proceedings.
  • The “USA Freedom Act”—which its proponents were heralding as “NSA reform” despite its suffocatingly narrow scope—died in the august U.S. Senate last night when it attracted only 58 of the 60 votes needed to close debate and move on to an up-or-down vote. All Democratic and independent senators except one (Bill Nelson of Florida) voted in favor of the bill, as did three tea-party GOP Senators (Ted Cruz, Mike Lee, and Dean Heller). One GOP Senator, Rand Paul, voted against it on the ground that it did not go nearly far enough in reining in the NSA. On Monday, the White House had issued a statement “strongly supporting” the bill.
  •  
    Glenn Greenwald on why the death of the USA Freedom Act is actually a Very Good Thing. I couldn't agree more.
Paul Merrell

Venezuela's Opposition Calls Protests Against Recall Postponement, Appeals to Military - nsnbc international | nsnbc international - 0 views

  • Venezuela’s political opposition vowed Friday to stage renewed protests against the administration of President Nicolas Maduro, after the country’s electoral authority heeded a court order postponing the next phase of preparations for a presidential recall referendum.
  • On Thursday, state-level courts in Aragua, Bolivar, Carabobo, and Monagas issued injunctions halting the opposition’s collection of signatures from 20 percent of voters in each state, scheduled for October 26, 27, and 28. The court orders come in response to revelations of widespread fraud in the opposition’s prior collection of signatures from 1 percent of voters in each state as a condition to begin the recall process earlier this year. In addition to 307,747 signatures lacking essential identifying information, 53,658 signatures presented irregularities, including 10,995 deceased persons, 9,333 nonexistent persons, 3,003 minors, and 1,335 felons. State courts have warned that the 1 percent of signatures collected in their states could be invalid due to the fraudulent signatures, preventing the opposition from going ahead with the next stage on a national level.
  • In 2014, Popular Will leader Leopoldo Lopez led months of violent anti-government protests, demanding the ouster of President Maduro. Over 40 people were killed, the majority of whom  government supporters, state security forces, and innocent bystanders.
  • ...1 more annotation...
  • Meanwhile, Venezuela’s Supreme Court has upheld the regional court decisions, prompting the CNE to likewise suspend next week’s collection drive on Thursday. The move could mean the MUD will have to restart the entire process in the four states where fraud allegations surface. Such an outcome would be a major setback for the MUD, which has been aiming to organise the referendum before the end of the year. This goal has long been dismissed as unrealistic by the CNE, which announced last month that the plebiscite could be held no sooner than April. The ultimate timing of the referendum is critical for the opposition. If Maduro loses a vote before January 10, snap elections will be held, and the socialists would face the prospect of losing the office of president for the first time in 14 years. The last time the right-wing took power was during a short lived, US backed coup in 2002. However, if the referendum takes place after January 10, Maduro will simply be replaced by his vice-president until regular elections are held in 2018.
  •  
    The U.S.-backed efforts to unseat the leftist government in Venezuela continues via propaganda, opposition-created shortages of living essentials, and the electorate, after 3 violent coup attempts failed.
Paul Merrell

Under Intense Pressure to Silence Wikileaks, Secretary of State Hillary Clinton Proposed Drone Strike on Julian Assange | True Pundit - 0 views

  • Clinton’s State Department was getting pressure from President Obama and his White House inner circle, as well as heads of state internationally, to try and cutoff Assange’s delivery of the cables and if that effort failed, then to forge a strategy to minimize the administration’s public embarrassment over the contents of the cables. Hence, Clinton’s early morning November meeting of State’s top brass who floated various proposals to stop, slow or spin the Wikileaks contamination. That is when a frustrated Clinton, sources said, at some point blurted out a controversial query. “Can’t we just drone this guy?” Clinton openly inquired, offering a simple remedy to silence Assange and smother Wikileaks via a planned military drone strike, according to State Department sources. The statement drew laughter from the room which quickly died off when the Secretary kept talking in a terse manner, sources said. Clinton said Assange, after all, was a relatively soft target, “walking around” freely and thumbing his nose without any fear of reprisals from the United States. Clinton was upset about Assange’s previous 2010 records releases, divulging secret U.S. documents about the war in Afghanistan in July and the war in Iraq just a month earlier in October, sources said. At that time in 2010, Assange was relatively free and not living cloistered in in the embassy of Ecuador in London. Prior to 2010, Assange focused Wikileaks’ efforts on countries outside the United States but now under Clinton and Obama, Assange was hammering America with an unparalleled third sweeping Wikileaks document dump in five months. Clinton was fuming, sources said, as each State Department cable dispatched during the Obama administration was signed by her.
  • Following Clinton’s alleged drone proposal, another controversial remedy was floated in the State Department to place a reward or bounty for Assange’s capture and extradition to the United States, sources said. Numbers were discussed in the realm of a $10 million bounty. A State Department source described that staff meeting as bizarre. One minute staffers were inquiring about the Secretary’s blue and black checkered knit sweater and the next minute, the room was discussing the legalities of a drone strike on Assange and financial bounties, sources said. Immediately following the conclusion of the wild brainstorming session, one of Clinton’s top aides, State Department Director of Policy Planning Ann-Marie Slaughter, penned an email to Clinton, Chief of Staff Cheryl Mills, and aides Huma Abebin and Jacob Sullivan at 10:29 a.m. entitled “an SP memo on possible legal and nonlegal strategies re Wikileaks.” “Nonlegal strategies.” How did that phrasing make it into an official State Department email subject line dealing with solving Wikileaks and Assange? Why would the secretary of state and her inner circle be discussing any “nonlegal strategies” for anything whatsoever? Against anyone? Shouldn’t all the strategies discussed by the country’s top diplomat be strictly legal only? And is the email a smoking gun to confirm Clinton was actually serious about pursuing an obvious “nonlegal strategy” proposal to allegedly assassinate Assange? Numerous attempts were made to try and interview and decipher Slaughter’s choice of email wording, however, she could not be reached for comment.
  • Slaughter’s cryptic email also contained an attached document called “SP Wikileaks doc final11.23.10.docx.” That attachment portion of Slaughter’s “nonlegal strategies” email has yet to be recovered by federal investigators and House committee investigators probing Clinton’s email practices while at State. Even Wikileaks does not have the document. Slaughter, however, shed some light on the attachment: “The result is the attached memo, which has one interesting legal approach and I think some very good suggestions about how to handle our public diplomacy.” But did it also include details on the “nonlegal strategies” teased in the subject line? Sources confirm Clinton took the email and attachment with her to the White House for an afternoon meeting with Secretary of Defense Bob Gates and National Security Advisor Tom Donilon prior to an additional evening meeting at the White House. President Obama, sources said, did not attend the early meeting with Gates as he was traveling with Vice President Joe Biden. President Obama did attend the second meeting, however, and Wikileaks and Assange’s planned release of secret cables were discussed at length, sources said. Attending this meeting were President Obama, Clinton, Gates, Donilon, Director of National Intelligence James Clapper, Deputy Secretary of State James Steinberg, Under Secretary of Defense for Policy Michele Flournoy, Chairman of the Joint Chiefs of Staff Admiral “Mike” Mullen, Vice Chairman of the Joint Chiefs of Staff Gen. James Cartwright as well as a half dozen or more various policy aides, sources confirmed. Did Clinton also share her alleged morning query of droning Assange with the members of the National Security Council and the President? Was it discussed among the top secret subjects in the meeting? Or was Clinton planning to conduct or hatch her own secret foreign policy in defiance of the President, a likely violation of the Logan Act?
  • ...3 more annotations...
  • The FBI’s 302 report from Clinton’s email investigation interview, again, specified that Clinton had “many discussions” related to “nominating” drone strikes on individuals: “Clinton could not recall a specific process for nominating a target for a drone strike and recalled much debate pertaining to the concurrence process. Clinton knew there was a role for DOD, State and the CIA but could not provide specifics as to what it was. Due to a disagreement between these agencies, Clinton recalled having many discussions related to nominating an individual for a drone strike. When Clinton exchanged classified information pertaining to the drone program internally at State, it was in her office or on a secure call. When Clinton exchanged classified information pertaining to the drone program externally it was at the White House. Clinton never had a concern with how classified information pertaining to the drone program was handled.” Sources said Clinton’s comments on neutralizing Assange fits a pattern of callousness when combined with the FBI testimony that she often considered droning individuals and then coupled with her reaction to Libyan leader Moammar Gaddafi’s death in Oct. 2011.
  • Unable to legally counter or stop Wikileaks, and likely abandoning any and all legal and “nonlegal strategies,” Clinton and her staff were forced to weather the collateral damage of CableGate. In fact, just five days after Clinton’s meetings on Mahogany Row in the State Department and the White House, Wikileaks began releasing cables to news outlets globally on Sunday November 28, 2010. Shortly after CableGate, the WikiLeaks founder sought refuge from authorities and threats by hiding at the Ecuadorian Embassy in London. Now 45, Assange is in his fifth year living quarantined inside the embassy. Clinton remains the Democratic nominee for the presidency of the United States.
  • Perhaps Democratic political operative Bob Beckel wasn’t a party outlier during this controversial Fox broadcast. Likely, Beckel was projecting what others, including Clinton, had already privately proposed.
Paul Merrell

Sanctuary Cities Have Upper Hand in Legal Battle Against Trump | News | teleSUR English - 0 views

  • As U.S. President Donald Trump ramps up his attack on immigration, his executive order to cut federal funding to so-called “sanctuary cities” protecting immigrants could face a number of legal and logistical loopholes.
  • The executive order signed on Wednesday orders federal agencies to withhold grant money from around 300 cities and counties that block local law enforcement from targeting undocumented immigrants, or as White House Press Secretary Sean Spice put it, “harbor illegal immigrants.” Spicer said that Trump will look at means to strip funding to cities and counties that “willfully refuse to comply” with his new plan to crack down on immigration, which also included ordering the construction of the infamous border wall between Mexico and the U.S. and increasing immigration authorities' power to deport people from the U.S., often without due process. These measures have sparked outrage among many immigrant rights organizations and caused city mayors to speak out against them. Opponents likely have the law on their side. Politico reported that the White House failed to consult the proper federal agencies and lawmakers before signing the executive orders. This means the orders are likely fraught with contradictions to current laws that can be easily exploited by opponents to dismantle them. The legal fight has already begun. Mayors of targeted cities are teaming up with immigration advocacy groups and attorneys to gear up for a legal battle against the presidential orders. Opponents of Trump’s order say that federal money allocated to cities can only be cut if the funding is directly linked to behavior that opposes the federal government’s plan for immigration.
  • Trump's plan to make police and other key services exempt from any funding cuts has also sparked legal debate. Trump had previously stated that even if a city was stripped of funding for non-compliance, police departments' funding would not be cut. Opponents also say that making police exempt would make it possible for a judge to deem parts of the order unconstitutional. Richard Doyle, city attorney in San Jose, California, argues that Trump cannot cut a city's funding for healthcare and education while protecting the police force from cuts because its function relates more closely to immigration enforcement, adding that it was uncertain whether only future or existing federal funding would be targeted under the order. Others have argued that there would be significant barriers and a long process for the federal government to cut off funding to sanctuary cities that would first have to go through states and local government where targeted jurisdictions have rights to appeal. Edward Waters from Feldesman Tucker Leifer Fidell in Washington told Reuters that for the Trump administration, “It’s fair to say that they don't understand the scope and reach of federal grants law.”
  • ...2 more annotations...
  • “The president has very limited power to exercise any kind of significant defunding,” Peter L. Markowitz from the Immigration Justice Clinic told The New York Times. Referring to a 2012 Supreme Court ruling, Markowitz argued that Congress cannot coerce states or localities to unwillfully participate in federal programs. “You can’t say ‘if you don’t use your police officers to go after unauthorized immigrants, you don’t get any money for your hospitals.’ They can’t impose conditions that are totally unrelated,” Markowitz said.
  • As U.S. President Donald Trump ramps up his attack on immigration, his executive order to cut federal funding to so-called “sanctuary cities” protecting immigrants could face a number of legal and logistical loopholes.
  •  
    Trump needs lawyers. He's screwing up right and left.
Paul Merrell

Venezuelan Conglomerate to Halt Beer Production | venezuelanalysis.com - 0 views

  • Polar, Venezuela’s largest private food and beverage provider, released a statement on Thursday that it will stop beer production, citing its inability to import raw materials. The company alleged the Venezuelan government has not issued sufficient US currency to purchase equipment and raw goods necessary to continue its production past this April. 
  • “Our current situation is this: We have not been able to replenish the inventory, and we only have malted barley to produce until April 29. Under those circumstances, we are obliged to suspend the production of beer and malts until we get access to the currency needed to procure the raw materials,” Polar’s statement continued.   Polar produces approximately 80 percent of beer consumed in Venezuela; however, due to rising beer prices, many artisanally crafted and traditional alcohols have become increasingly popular across the country.
  • While a complete halt to production would be a significant blow to workers; on other occasions, factory workers have taken over company plants following unexpected closures. Such was the case of the Clorox factory in Los Valles del Tuy, Miranda on the outskirts of Caracas in 2014. In recent years, the Venezuelan government as well as grassroots have denounced the hoarding of raw materials and alleged shortages are tactics used by private companies to instigate destabilization and the economic war. Polar along with other corporations have been among those accused of such actions. Polar is also well-known for its cornmeal flour product Harina Pan, used to make the national dish “arepas” which is now a rare sight on supermarket shelves and often sold at speculated prices.   The government and Venezuelan grassroots have also denounced Polar’s owner, Lorenzo Mendoza of hoarding, misappropriating state-subsidized dollars as well as conspiration against the government. Mendoza has denied these allegations.
  • ...1 more annotation...
  • In February, protestors in Catia on the west side of Caracas known for its working class roots also took-over Polar distribution trucks to demand that the company stop hoarding basic food and goods.
  •  
    Having failed in two violent coup attempts that were thwarted, the U.S., UK, and Israel, acting in convert with Venezuelan oligarchs have succeeded in inflicting enough misery that the Opposition has won a controlling majority in the Venezuelan legislature. The Bolivarian Revolution lives on at least for now in the executive and justice branches of government. A presidential impeachment process is about to begin without any impeachable offense being alleged. The U.S. has been pushing very hard diplomatically and via stiff economic sanctions to secure the release of principles in the previous violent coup attempts. A bill declaring amnesty for them was found unconstitutional by the Venezuelan high court. (I haven't checked but I suspect Venezuela's constitution  resembles that of the U.S. in placing the pardon power strictly in the hands of the Executive.) Watch out, Venezuela, if Hillary becomes the U.S. PreZ. 
Gary Edwards

The Daily Bell - Richard Ebeling on Libertarianism, Anarchism and the Truth of Austrian Economics - 0 views

  • These are at least two conceivable methods of compelling the government to stop, or limit, its abuse of the monetary printing press.
    • Gary Edwards
       
      Ebeling proposes two methods of reining in out of control government printing of paper money.  There is a third method; one used by Lincoln and Kennedy.  This is the issuance of gold/silver/oil backed reserve notes.  The notes represent gold or silver being held on deposit, and are fully redeemable.   The value of the gold/silver or another commodity represented floats in the marketplace against goods and services.  Nor is there a fixed exchange rate for converting fiat (paper) dollars.  The market will figure those things out if left free to do so.  And that's one big big "if".
  • So the normal market pressures of downward price and wage adjustments in the recession are partly counter-acted by a new monetary expansion that is delaying the necessary re-coordination of market activities. Thus, given these two pressures, prices do not fall as much as a post-recession adjustment may require and they do not rise as much or as fast as might otherwise occur due to the renewed monetary expansion.
  • At the same time, as you correctly ask, the Federal Reserve has been paying banks a relatively low rate of interest to keep large excessive reserves in their accounts at the Federal Reserve, rather than to fully lend those excessive reserves to private borrowers. And given the low market rates of interest that Federal Reserve policy has generated, even the low rate of interest on unlent excess reserves offered to banks by the Federal Reserve appears the relatively more profitable way to use their available funds.
  • ...44 more annotations...
  • Why has the Federal Reserve done this? They infused these two trillion dollars into the financial markets back in 2008-2010 because they feared that an economy-wide bank collapse was possible. They are afraid to reverse this monetary expansion because to do so would reduce potential bank-lending capacity and put upward pressure on interest rates at a time when the Federal Reserve wants to prevent the sluggish recovery from slowing down even more and also raise the cost of the US government's financing of its trillion dollar a year deficits. So, instead, they leave this excess bank lending power sloshing around in the system, while keeping it off the market and from causing significant new price inflationary pressures, by paying banks not to lend those vast sums.
  • Austrians argue that economics is fundamentally a science and study of "human action." It attempts to trace out the logic and implications of man's intentional conduct in selecting among ends desired and applying perceived means to try to attain them. Austrians emphasize that all human action and the social and market interactions among men occur in a setting of imperfect knowledge, inescapable degrees of uncertainty and always through the passage of time.
  • They try to explain the market processes by which men discover mutual gains from trade.
  • They emphasize that the networks of social institutions in which and through which men discover ways to coordinate their interdependent actions in complex systems of division of labor are not the creations of government edict or command; but are most often among those unintended consequences of multitudes of self-interested individual actions and interactions.
  • They have developed theories of market competition and the role of the entrepreneur as the individuals always alert to market opportunities, and whose actions tend to bring about coordination between market supplies and demands.
  • The Austrian analysis of markets, competition and prices, led them to devastating critiques of the unworkability of all forms of socialist central planning, the inherent contradictions and inconsistencies in virtually all forms of government intervention and regulation, and a theory of money and the business cycle that points the finger of responsibility for inflations and recessions at the doorstep of government monetary and fiscal policies.
  • The philosophy of liberty proclaims that each individual is unique and possessing inherent rights to his life, liberty and honestly acquired property.
  • It is not surprising that classical liberal and libertarian ideas are often attacked. After all they are the ideas that consistently oppose the current political systems of plunder, privilege and power lusting.
  • That government, if it is to exist, is to serve as the protector and guardian of our distinct individual rights, and not the master of men who are obligated to sacrifice themselves for some asserted "national interest," "general welfare," or "common good."
  • The only reasonable meaning to the "common good" or the "general welfare" is when each individual is free to peacefully live his life as he chooses and is at liberty to voluntarily associate and interact with his fellow men for mutually beneficial improvements to their lives.
  • It is virtually inevitable that those who use political power for their own gain at their neighbor's expense will vehemently resist and oppose any attempt to stop them from feeding at the government trough.
  • there is everywhere a class of plundering peoples – politicians, bureaucrats, special interest groups – receiving tax-based income redistributions and subsidies and benefiting from anti-competitive regulations and protections against and at the expense of their fellow human beings.
  • This is the great battle of the twenty-first century;
  • Austrian Economics, not surprisingly, has been attacked precisely because of its insightful and cogent analysis of how it was government intervention and central bank monetary manipulation that generated the unsustainable boom in the last decade that set the stage for the inescapable bust, which the world is still suffering from.
  • There are "natural rights" libertarians
  • "utilitarian" or "consequentialist" libertarians.
  • most convincing case for human liberty
  • Because libertarians have not agreed about this among themselves, nor have they been able to persuade enough others in society to move the world further away from the collectivist premises and the interventionist-welfare state policies that guide so much that goes on in the world.
  • I happen to have been most strongly influenced by the "natural rights" defense of liberty, and especially as formulated by Ayn Rand in her philosophy of Objectivism.
  • First, it is argued that if one believes that the use of any and all forms of coercion are morally unacceptable in human relationships, then this should also imply that any compulsory taxation, even when for the funding of defense and legal justice, is unjustifiable. And, second, it is argued that the private sector could provide such admittedly essential services far more efficiently and cost-effectively than the monopoly agency of government. Murray Rothbard and David Friedman probably have been among the most well-known and articulate proponents of the anarcho-capitalist position over the last 50 years.
  • Others like the Ayn Rand, Robert Nozick and Ludwig von Mises have made the case for constitutionally limited government. Their counter arguments have centered on the ideas that conflicts over jurisdiction, disputes among private defense agencies contracted by different individuals who have disagreements, and the likelihood that "defense" would turn out to be a "natural monopoly" anyway – that is, a tendency for one agency to end up being the single provider of defense and judicial services over a wide geographical area – raise questions about the long-run workability and sustainability of competing defense companies in society.
  • From a moral perspective, I am in sympathy with the anarcho-capitalist position, in that I find the compulsory taking of people's income and wealth without their consent for whatever reason to be ethically repugnant.
  • We should focus on what we all agree upon:
  • This means that the Supreme Court has said that you are the slave of "society" and the government that represents "the people," since, in principle, anything that you do or not do can be argued to have some affect, positive or negative, on others.
  • Think about this Court decision. It is saying that if you do not buy health insurance the government will tax you to pay for it. If you refuse to pay the tax, the government will end up attempting to seize financial assets or real property you own in lieu of failure to pay. If you try to prevent this taking of your property, you are subject to arrest and imprisonment. If you resist arrest or imprisonment, the police have the authority to force you to comply – up to and including lethal force to subdue you into obedience.
  • the freedom and dignity of the individual human being; and the attempt whenever and wherever on our part to reduce, repeal and abolish all forms of regulation, control, restriction, prohibition on the peaceful and honest affairs of our fellow men.
  • Once you accept this premise, there is no end to the minutest detail and content of your life and actions the government cannot claim jurisdiction over to regulate, control or prohibit.
  • Here is that end-of-the-road of the notion of unlimited democratic rule by "the people" and those who claim to speak for "the people" and rule on their behalf.
  • Ayn Rand, of course, rejected any connection or compatibility with libertarianism. She argued this on two grounds. First, she felt that too frequently libertarians spoke of individual freedom, free markets and limited government, but failed to explicitly and clearly ground their political-economic ideas in a demonstrable philosophy of man, nature and society.
  • Government control of money is the potentially most dangerous and damaging form of government power short of outright socialism.
  • Rand's political philosophy arises out of the "natural rights" tradition, that rights are inherent in the nature of man and precede government.
  • Mises believed that rights were, in a sense, "social conventions" that had evolved out of the discovery that certain social institutional arrangements were more conducive to the mutual betterment of all members of society for achieving their individual goals and values
  • What they did agree upon was that, given their respective conceptions of the basis of individual rights, there was no social and economic system more consistent with the protection of those rights and more likely to generate the material and cultural achievements that are potentially possible than laissez-faire capitalism.
  • And in the twentieth century, Rand and Mises were two of the most principled and uncompromising advocates for the completely free market society
  • Second, she rejected the anarchist elements in the libertarian movement, believing that any reasonable analysis of the reality of man and the human condition strongly suggested the inescapable need for a single legal standard for defining and enforcing individual rights and a single authority to as impartially and "objectively" as possible enforce laws defending each individual's rights to his life, liberty and honestly acquired property.
  • "Hardly ever do the advocates of free capitalism realize how utterly their ideal was frustrated at the moment the state assumed control of the monetary system . . .
  • A 'free' capitalism with government responsibility for money and credit has lost its innocence.
  • From that point on it is no longer a matter of principle but one of expediency how far one wishes or permits government interference to go.
  • Money control is the supreme and most comprehensive of all governmental controls short of expropriation."
  • Government basically has three ways to acquire the income and wealth of its citizens: taxation, borrowing and printing money
  • So, governments throughout history have turned to the monetary printing press to fund the expenditures not covered by taxes or borrowed money
  • This "non-neutral," or uneven, impact on prices and wages in the economy during the inflationary process brings in its wake distorted profit margins, misallocations of resources and labor and various mal-investments of capital. Here are the seeds for the artificial and unsustainable "booms" that invariably come crashing down in the "bust" once the monetary expansion that has set it all in motion is stopped or slowed down.
  • I believe that the choice and use of money should be left to the market, that is, to the free and voluntary interactive decisions of those buying and selling in the market.
  • I consider a private, competitive free banking system to be the only one consistent with a truly free market society.
Paul Merrell

Obama Promises Disappear from Web - Sunlight Foundation Blog - 1 views

  • Change.gov, the website created by the Obama transition team in 2008, has effectively disappeared sometime over the last month. While the front splash page for Change.gov has linked to the main White House website for years, until recently, you could still continue on to see the materials and agenda laid out by the administration. This was a particularly helpful resource for those looking to compare Obama's performance in office against his vision for reform, laid out in detail on Change.gov. According to the Internet Archive, the last time that content (beyond the splash page) was available was June 8th -- last month.
  • Here's one possibility, from the administration's ethics agenda: Protect Whistleblowers: Often the best source of information about waste, fraud, and abuse in government is an existing government employee committed to public integrity and willing to speak out. Such acts of courage and patriotism, which can sometimes save lives and often save taxpayer dollars, should be encouraged rather than stifled. We need to empower federal employees as watchdogs of wrongdoing and partners in performance. Barack Obama will strengthen whistleblower laws to protect federal workers who expose waste, fraud, and abuse of authority in government. Obama will ensure that federal agencies expedite the process for reviewing whistleblower claims and whistleblowers have full access to courts and due process.
Paul Merrell

US House of Reps: Europe Can't Boycott Israel - International Middle East Media Center - 0 views

shared by Paul Merrell on 14 Jun 15 - No Cached
  • The United States House of Representatives has fast-tracked a bill regarding a free trade agreement between the US and Europe which would include a section barring EU countries from any form of commercial boycott against Israel and Israeli goods.
  • According to the PNN, Israel’s Ynetnews indicated that two versions of the law had been presented to the House of Representatives and the Senate, clarifying that both versions included the section obligating EU countries to refrain from the boycott of Israeli products. This section states that any affiliation and cooperation with the Boycott, Divestment and Sanctions (BDS) movement on the part of EU countries is in violation of the “principle of non-discrimination’ statute in the General Agreement on Tariffs and Trade (GATT). According to Ynetnews, the second law did not pass at this stage due to disputes with respect to compensation for businesses in Europe. There was also severe opposition from Obama’s own Democrats, but it is expected that an agreement will be reached between the House of Representatives and the Senate during the coming days. From the moment that an agreement is reached, a unified document will be presented to the American President, Barack Obama, for a review of the trade agreement as soon as possible. He will then sign the document and it will be put to the vote in the House of Representatives and the Senate.
  •  
    see also http://www.ynetnews.com/articles/0,7340,L-4667914,00.html I'd love to see this wind up in the WTO Dispute Resolution Process. The Israeli production of goods and services in the Occupied Territories is a war crime under international law. Dealing in such goods is also a war crime. It is actually illegal for European nations to allow their import. Moreover, the right to participate in a boycott is protected by the U.S. Constitution's First Amendment. The judges at the WTO are very good and have previously held that trade agreements have to give way to human rights established under international law. And of course boycotts are also protected as human rights under international law. The WTO judges would have a field day with this situation. That is no guarantee that the EU will not succumb to US pressure but this will guarantee lots of press coverage for the U.S.A.'s continued support for Israeli war crimes. And that is publicity that Israel's right-wing government does not want.
Paul Merrell

NSA giving 'a lot of thought' to privacy rights of overseas citizens - top lawyer | World news | theguardian.com - 0 views

  • The top lawyer for the US intelligence community and the National Security Agency said on Wednesday that the spy agencies are giving new consideration to the privacy rights of non-Americans in the wake of a diplomatic row over the surveillance of foreign leaders. Speaking at a conference on national security law sponsored by the American Bar Association on Thursday, the general counsel for the office of the director of national intelligence, Robert Litt, said intelligence chiefs were giving "a lot of thought" to the issue. His comments came a day after General Keith Alexander, the NSA director, stated that the spy agency is open to scaling back some of its operations on foreign leaders, following an unfolding diplomatic crisis sparked by revelations that the NSA spied on German chancellor Angela Merkel. 
  • US law provides greater legal protection to those defined as "US persons", which includes American citizens and foreigners living in the US. "On the issue of US person versus non-US person, that’s an issue we’re giving a lot of thought to now,” said Litt. “It’s not surprising that the law gives more protections to US citizens or persons who are in this country,” Litt added. “That doesn’t mean that we have no protection for non-US persons, and the principal protection we have is the requirement that the collection, retention and dissemination of information has to be for a valid foreign intelligence purpose.” Litt said the intelligence agencies were “giving some thought to whether there are ways that we can both introduce a little more rigor into that requirement and perhaps a little more transparency into how we enforce that requirement.” Litt and NSA general counsel Rajesh De would not answer a question from the Guardian about the legal basis for a different, unfolding NSA controversy: the new allegation that the NSA intercepts data transiting between the foreign data centers of Google and Yahoo, two longtime NSA partners, published in the Washington Post.
  • But De took issue with a suggestion that the Post story prompted that the NSA interception would at times rely on a seminal executive order that defines basic powers and operations of the intelligence agencies, known as Executive Order 12333, rather than the relatively restrictive Foreign Intelligence Surveillance Act, or Fisa. “The implication, the insinuation, the suggestion or the outright statement that an agency like NSA would use authority under Executive Order 12333 to evade, skirt or go around Fisa is simply inaccurate,” De said. On Tuesday, the director of national intelligence, James Clapper, testified to the House intelligence panel that they considered US corporations to be “US persons,” meaning their communications and associated data enjoyed legal privileges associated with citizenship. But neither Litt nor De would explain whether that category protected communications data transiting between the data centers of US companies.
  • ...2 more annotations...
  • Both Litt and De spoke hours before the Senate intelligence committee was due to begin a second day of considering chairwoman Dianne Feinstein’s proposal to increase transparency around the NSA’s surveillance activities. A Tuesday afternoon markup session of the bill – whose text is not yet public – went uncompleted. Feinstein, previously an unequivocal supporter of the NSA, unexpectedly criticized the agency’s surveillance on foreign leaders, a relatively traditional surveillance function. Feinstein on Monday declared herself “totally opposed” to the collection and suggested her oversight committee was not “fully informed” of the practice. A similar rift has emerged between NSA and the White House over how much President Obama knew about the spying, which US officials have said does not currently take place and will not resume. Litt appeared to concede that Obama himself may not have known about spying on Merkel, but contended that the White House and Senate intelligence committee had all the information necessary to understand it was taking place.
  • “I completely disagree with the proposition that the fact that the president and the chairman of the Senate intelligence committee didn’t know every single one of these selectors the NSA was tasking means there is ineffective oversight,” Litt said. “What the president knew and what the Senate intelligence committee knows: they know what our intelligence priorities are. Those are set annually through the interagency process. That says, here’s the kind of information we need to collect. And that gets sent out to the intelligence community and then the intelligence community, through a process that works down through the ranks, figures out what’s the best way to select that. “It’s very easy in hindsight to say, well, this particular selector was sensitive and so the president should have been told that,” Litt continued. “That’s always true in hindsight. Virtually everything we do, if it comes out, is going to be embarrassing.”
  •  
    So if they're not relying on either FISA or EO 12333, are they simply ignoring any legal restraints on the Agency? It's interesting that the NSA house of cards only crumbled with the announcement of spying on 35 foreign national leaders. Personally, I'd vote for putting the leader of every nation in a glass house, butt naked, and able to communicate with others only through a loudspeaker/broadcast system audible to everyone in the world. Secrecy in government is the problem, not a solution. 
Paul Merrell

AP Exclusive: US Changing No-Fly List Rules - ABC News - 0 views

  • The Obama administration is promising to change the way travelers can ask to be removed from its no-fly list of suspected terrorists banned from air travel. The decision comes after a federal judge's ruling that there was no meaningful way to challenge the designation, a situation deemed unconstitutional. In response, the Justice Department said the U.S. will change the process during the next six months. As of late last summer, about 48,000 people were on the no-fly list. The government's policy is never to confirm or deny that a person actually is on the no-fly list, citing national security concerns. In most instances, travelers assume they are on the list because they are instructed to go through additional screening at airports or because they are told they can't board their flights to, from or within the United States. The no-fly list is one of the government's most controversial post-9/11 counterterrorism programs because of its lack of due process, long criticized because people cannot know why they were placed on the list and lack a way to fight the decision. Changing how people can challenge their designation could amount to one of the government's most significant adjustments to how it manages the list.
Gary Edwards

Jobs Depend on Obamacare Defeat | Cato Institute - 0 views

  • The Affordable Care Act authorizes the disputed “employer mandate” penalties and the health insurance subsidies that trigger them, only through insurance exchanges that are “established by the State.” Due to public opposition to Obamacare, at least 34 states, including Virginia, Utah and Indiana, failed to establish exchanges. Those states are being served — if that’s the word — by HealthCare.Gov, an exchange established by the federal government, which is clearly not a “State.” Ignoring the clear and unambiguous language of the statute, the IRS somehow decided to deploy the disputed taxes and spending in HealthCare.Gov states. Two lower courts found that Obamacare itself “unambiguously forecloses” the IRS’ “invalid” misinterpretation of the law. The plaintiffs in King v. Burwell represent Kevin Pace and tens of millions of other Americans who are injured by this breathtaking power grab.
  • If the King plaintiffs prevail before the Supreme Court, it will mean more jobs, more hours and higher incomes for millions of Americans — particularly part-time and minimum-wage workers. Employers will have more flexibility to structure their health benefits. States will be able to attract new businesses by shielding employers from Obamacare’s employer mandate. Critics complain such a ruling would eliminate subsidies in HealthCare.gov states, making the cost of Obamacare coverage transparent to enrollees. But those enrollees will be able to switch to lower-cost “catastrophic” plans — if the Obama administration allows it. To date, the administration has adamantly refused to say whether it would take even this small step to help affected HealthCare.gov enrollees.
  • More important, transparency is a good thing. If enrollees don’t want to pay the full cost of Obamacare coverage, that tells us something very important about Obamacare. It means nobody likes the way Obamacare actually works. Forcing the IRS to implement the law as written will thus create an opportunity for real health care reforms that actually reduce the cost of care. Reining in the IRS would affirm the rule of law, and lead to real health care reform. We should all hope for such an outcome.
  •  
    "By Michael F. Cannon This article appeared on USA Today on March 4, 2015. As if Obamacare weren't problematic enough, two federal courts have found that the IRS unlawfully expanded the health care law's individual and employer mandates, by imposing them on tens of millions of Americans whom Congress exempted. On Wednesday, the Supreme Court will hear King v. Burwell, a case challenging that illegal and ongoing attempt to expand Obamacare outside the legislative process. The victims of this illegal Obamacare expansion include Kevin Pace, a jazz musician and adjunct professor of music in Northern Virginia. Anticipating the Obamacare mandate that employers cover all workers who put in at least 30 hours a week, Pace's employer was forced to cut hours for part-time professors like him in order to avoid massive penalties. In 2013, The Washington Post reported that Pace was left with "an $8,000 pay cut." "Thousands of other workers in Virginia" also had their hours cut. Even though the Obama administration has delayed the employer mandate, many employers have left the cuts in place for when the rules are enforced. " King v. Burwell is about more than IRS rules; it could kill the employer mandate, too." This unlawful expansion of Obamacare's employer mandate is causing workers across the country to lose more income with every passing day. It forced Utah's Granite School District to cut hours for 1,200 part-timers. According to the state of Indiana, which filed a similar legal challenge, this IRS power grab pushed "many Indiana public school corporations (to) reduc(e) the working hours of instructional aides, substitute teachers, non-certified employees, cafeteria staff, bus drivers, coaches and leaders of extracurricular activities." Employers and consumers are also suffering. Pace's employer, for example, has less flexibility to structure its health benefits and less ability to offer attractive educational options to its stude
Paul Merrell

Virtual Economy's Phantom Job Gains Are Based on Statistical Fraud. And More Fraud Is in the Works | Global Research - 0 views

  • Washington can’t stop lying.  Don’t be convinced by last Thursday’s job report that it is your fault if you don’t have a job. Those 288,000 jobs and 6.1% unemployment rate are more fiction than reality.  In his analysis of the June Labor Data from the Bureau of Labor Statistics, John Williams (www.ShadowStats.com) wrote that the 288,000 June jobs and 6.1% unemployment rate  are “far removed from common experience and underlying reality.” Payrolls were overstated by “massive, hidden shifts in seasonal adjustments,” and the Birth-Death model added the usual phantom jobs.  Williams reports that “the seasonal factors are changed each and every month as part of the concurrent seasonal-adjustment process, which is tantamount to a fraud,” as the changes in the seasonal factors can inflate the jobs number.  While the headline numbers always are on a new basis, the prior reporting is not revised so as to be consistent.
  • The monthly unemployment rates are not comparable, so one doesn’t know whether the official U.3 rate (the headline rate that the financial press reports) went up or down. Moreover, the rate does not count discouraged workers who, unable to find a job, cease looking. To be counted among the U.3 unemployed, the person must have actively looked for work during the four weeks prior to the survey. The U.3 rate automatically declines as people who have been unable to find jobs cease trying to find one and thereby cease to be counted as unemployed. There is a second official measure of unemployment that includes people who have been discouraged for less than one year. That rate, known as U.6, is seldom reported and is double the 6.1% rate. Since 1994 there has been no official measure than includes discouraged people who have not looked for a job for more than a year. Including all discouraged workers produces an unemployment rate that currently stands at 23.1%, almost four times the rate that the financial press reports.
  • What you can take away from this is the opposite of what the presstitute media would have you believe.  The measured rate of unemployment can decline simply because large numbers of the unemployed become discouraged workers, cease looking for work, and cease to be counted in the U.3 and U.6 measures of the unemployment rate.   The decline in the employment-population ratio from 63% prior to the 2008 downturn to 59% today reflects the growth in discouraged workers.  Indeed, the ratio has not recovered its previous level during the alleged recovery, an indication that the recovery is an illusion created by the understated measure of inflation that is used to deflate nominal GDP growth.
  • ...8 more annotations...
  • Insurance (most likely the paperwork of Obamacare) contributed 8,500 jobs. As so few can purchase homes, “real estate rental and leasing” contributed 8,500 jobs. Professional and business services contributed 67,000 jobs, but 57% of these jobs were in employment services, temporary help services, and services to buildings and dwellings.   That old standby, education and health services, accounted for 33,700 jobs consisting mainly of ambulatory health care services jobs and social assistance jobs of which three-quarters are in child day care services.   The other old standby, waitresses and bartenders, gave us 32,800 jobs, and amusements, gambling, and recreation gave us 3,500 jobs.
  • In other words, the economy did not gain 288,000 new jobs last month.   But let’s assume the economy did gain 288,000 jobs and exam where the claimed jobs are reported to be. Of the alleged 288,000 new jobs, 16,000, or 5.5 percent are in manufacturing, which is not very promising for engineers and blue collar workers.  Growth in goods producing jobs has almost disappeared from the US economy.  As explained below, to alter this problem the government is going to change definitions in order to artificially inflate manufacturing jobs. In June private services account for 82 percent of the supposed new jobs.  The jobs are found mainly in non-tradable domestic services that pay little and cannot be exported to help to close the large US trade deficit. Wholesale and retail trade account for 55,300 jobs.  Do you believe sales are this strong  when retailers are closing stores and when shopping malls are closing?
  • Another indication that there has been no recovery is that Sentier Research’s index of real median household income continued to decline for two years after the alleged recovery began in June 2009.   There has been a slight upturn in real median household income since June 2011, but income remains far below the pre-recession level.   The Birth-Death model adds an average of 62,000 jobs to the reported payroll jobs numbers each month. This arbitrary boost to the payroll jobs numbers is in addition to the Bureau of Labor Statistics’ underlying assumption that unreported jobs lost to business failures are matched by unreported new jobs from new business startups, an assumption that does not well fit an economy that fell into recession and is unable to recover.   John Williams concludes that in current BLS reporting, “the aggregate average overstatement of employment change easily exceeds 200,000 jobs per month.”
  • Local government, principally education, gave us 22,000 jobs.   So, where are the jobs for university graduates?  They are practically non-existent. Think of all the MBAs, but June had only 2,300 jobs for management of companies and enterprises. Think of the struggle to get into law and medical schools.  There’s no job payoff. June had jobs for 1,200 in legal services, which includes receptionists and para-legals.  Where are all the law school graduates finding jobs? Offices of physicians (mainly people who fill out the mandated paperwork and comply with all the regulations, which have multiplied under ObamaCare) hired 4,000 people.  Outpatient care centers hired 700 people.  Nursing care facilities hired 2,400 people.  So where are the jobs for the medical school graduates? Aside from all the exaggerations in the jobs numbers of which ShadowStats.com has informed us, just taking the jobs as reported, what kind of economy do these jobs indicate:  a superpower whose pretensions are to exercise hegemony over the world or an economy in which opportunities are disappearing and incomes are falling?
  • Do you think that this jobs picture would be the same if the government in Washington cared about you instead of the mega-rich? Some interesting numbers can be calculated from table A.9 in the BLS press release.  John Williams advises that the BLS is inconsistent in the methods it uses to tabulate the data in table A.9 and that the data is also afflicted by seasonal adjustment problems.  However, as the unemployment rate and payroll jobs are reported regardless of their problems, we can also report the BLS finding that in June 523,000 full-time jobs disappeared and 800,000 part time jobs appeared. Here, perhaps, we have yet another downside of the misnamed Obama “Affordable Care Act.”  Employers are terminating full-time employment and replacing the jobs with part-time employment in order to come in under the 50-person full time employment that makes employers responsible for fringe benefits such as health care. Americans are already experiencing difficulties making ends meet, despite the alleged “recovery.”  If yet another half million Americans have been forced onto part-time pay with consequent loss of health care and other benefits, consumer demand is further compressed, with the consequence, unless hidden by statistical trickery, of a 2nd quarter negative GDP and thus officially the reappearance of recession.
  • What will the government do if a recession cannot be hidden?  If years of unprecedented money printing and Keynesian fiscal deficits have not brought recovery, what will bring recovery?  How far down will US living standards fall for the 99% in order that the 1% can become ever more mega-rich while Washington wastes our diminishing substance exercising hegemony over the world? Just as Washington lied to you about Saddam Hussein’s weapons of mass destruction, Assad’s use of chemical weapons, Russian invasion of Ukraine, Waco, and any number of false flag or nonexistent attacks such as Tonkin Gulf, Washington lies to you about jobs and economic recovery.  Don’t believe the spin that you are unemployed because you are shiftless and prefer government handouts to work.  The government does not want you to know that you are unemployed because the corporations offshored American jobs to foreigners and because economic policy only serves the oversized banks and the one percent. Just as the jobs and inflation numbers are rigged and the financial markets are rigged, the corrupt Obama regime is now planning to rig US manufacturing and trade statistics in order to bury all evidence of offshoring’s adverse impact on our economy.
  • The federal governments Economic Classification Policy Committee has come up with a proposal to redefine fact as fantasy in order to hide offshoring’s contribution to the US trade deficit, artificially inflate the number of US manufacturing jobs, and redefine foreign-made manufactured products as US manufactured products.  For example, Apple iPhones made in China and sold in Europe would be reported as a US export of manufactured goods. Read Ben Beachy’s important report on this blatant statistical fraud in CounterPunch’s July 4th weekend edition: http://www.counterpunch.org/2014/07/04/we-didnt-offshore-manufacturing/ China will not agree that the Apple brand name means that the phones are not Chinese production. If the Obama regime succeeds with this fraud, the iPhones would be counted twice, once by China and once by the US, and the double-counting would exaggerate world GDP. For years I have exposed the absurd claim that offshoring is merely the operation of free trade, and I have exposed the incompetent studies by such as Michael Porter at Harvard and Matthew Slaughter at Dartmouth that claimed to prove that the US was benefitting from offshoring its manufacturing.  My book published in 2012 in Germany and in 2013 in the US, The Failure of Laissez Faire Capitalism and Economic Dissolution of the West, proves that offshoring has dismantled the ladders of upward mobility that made the US an opportunity society and is responsible for the decline in US economic growth. The lost jobs and decline in the middle class has contributed to the rise in income inequality, the destruction of tax base for cities and states, and loss of population in America’s once great manufacturing centers.
  • For the most part economists have turned a blind eye. Economists serve the globalists.  It pays them well. The corruption in present-day America is total. Psychologists and anthropologists serve war and torture. Economists serve globalism and US financial hegemony. Physicists and chemists serve the war industries. Physicists and computer geeks serve NSA. The media serves the government and the corporations. The political parties serve the six powerful private interest groups that rule the country. No one serves truth and liberty. I predict that within ten years truth and liberty will be forbidden words uttered only by “domestic extremists” who are a threat that must be exterminated without due process of law. America has left us.  We now have the tyranny of the Orwellian state that rules, not by the ballot box and Constitution, but by force and propaganda.
Paul Merrell

Tomgram: Shamsi and Harwood, An Electronic Archipelago of Domestic Surveillance | TomDispatch - 0 views

  • Uncle Sam’s Databases of Suspicion A Shadow Form of National ID
  • We do know that the nation’s domestic-intelligence network is massive, including at least 59 federal agencies, over 300 Defense Department units, and approximately 78 state-based fusion centers, as well as the multitude of law enforcement agencies they serve. We also know that local law enforcement agencies have themselves raised concerns about the system’s lack of privacy protections.
  • The SAR database is part of an ever-expanding domestic surveillance system established after 9/11 to gather intelligence on potential terrorism threats. At an abstract level, such a system may seem sensible: far better to prevent terrorism before it happens than to investigate and prosecute after a tragedy. Based on that reasoning, the government exhorts Americans to “see something, say something” -- the SAR program’s slogan. Indeed, just this week at a conference in New York City, FBI Director James Comey asked the public to report any suspicions they have to authorities. “When the hair on the back of your neck stands, listen to that instinct and just tell somebody,” said Comey. And seeking to reassure those who do not want to get their fellow Americans in trouble based on instinct alone, the FBI director added, “We investigate in secret for a very good reason, we don't want to smear innocent people.”
  • ...15 more annotations...
  • At a fundamental level, suspicious activity reporting, as well as the digital and physical infrastructure of networked computer servers and fusion centers built around it, depends on what the government defines as suspicious.  As it happens, this turns out to include innocuous, First Amendment-protected behavior. As a start, a little history: the Nationwide Suspicious Activity Reporting Initiative was established in 2008 as a way for federal agencies, law enforcement, and the public to report and share potential terrorism-related information. The federal government then developed a list of 16 behaviors that it considered “reasonably indicative of criminal activity associated with terrorism.” Nine of those 16 behaviors, as the government acknowledges, could have nothing to do with criminal activity and are constitutionally protected, including snapping photographs, taking notes, and “observation through binoculars.”
  • There are any number of problems with this approach, starting with its premise.  Predicting who exactly is a future threat before a person has done anything wrong is a perilous undertaking. That’s especially the case if the public is encouraged to report suspicions of neighbors, colleagues, and community members based on a “hair-on-the-back-of-your-neck” threshold. Nor is it any comfort that the FBI promises to protect the innocent by investigating “suspicious” people in secret. The civil liberties and privacy implications are, in fact, truly hair-raising, particularly when the Bureau engages in abusive and discriminatory sting operations and other rights violations.
  • A few months later, a scathing report from the Senate subcommittee on homeland security described similar intelligence problems in state-based fusion centers. It found that Department of Homeland Security (DHS) personnel assigned to the centers “forwarded ‘intelligence’ of uneven quality -- oftentimes shoddy, rarely timely, sometimes endangering citizens’ civil liberties and Privacy Act protections... and more often than not unrelated to terrorism.”
  • Law enforcement officials, including the Los Angeles Police Department’s top counterterrorism officer, have themselves exhibited skepticism about suspicious activity reporting (out of concern with the possibility of overloading the system). In 2012, George Washington University’s Homeland Security Policy Institute surveyed counterterrorism personnel working in fusion centers and in a report generally accepting of SARs noted that the program had “flooded fusion centers, law enforcement, and other security outfits with white noise,” complicating “the intelligence process” and distorting “resource allocation and deployment decisions.” In other words, it was wasting time and sending personnel off on wild goose chases.
  • Under federal regulations, the government can only collect and maintain criminal intelligence information on an individual if there is a “reasonable suspicion” that he or she is “involved in criminal conduct or activity and the information is relevant to that criminal conduct or activity.” The SAR program officially lowered that bar significantly, violating the federal government’s own guidelines for maintaining a “criminal intelligence system.” There’s good reason for, at a minimum, using a reasonable suspicion standard. Anything less and it’s garbage in, garbage out, meaning counterterrorism “intelligence” databases become anything but intelligent.
  • yet another burgeoning secret database that the federal government calls its “consolidated terrorism watchlist.” Inclusion in this database -- and on government blacklists that are generated from it -- can bring more severe repercussions than unwarranted law enforcement attention. It can devastate lives.
  • There is hope, however. In August, four years after the ACLU filed a lawsuit on behalf of 13 people on the no-fly list, a judge ruled that the government’s redress system is unconstitutional. In early October, the government notified Mashal and six others that they were no longer on the list. Six of the ACLU’s clients remain unable to fly, but at least the government now has to disclose just why they have been put in that category, so that they can contest their blacklisting. Soon, others should have the same opportunity.
  • As of August 2013, there were approximately 47,000 people, including 800 U.S. citizens and legal permanent residents like Mashal, on that secretive no-fly list, all branded as “known or suspected terrorists.” All were barred from flying to, from, or over the United States without ever being given a reason why. On 9/11, just 16 names had been on the predecessor “no transport” list. The resulting increase of 293,650% -- perhaps more since 2013 -- isn’t an accurate gauge of danger, especially given that names are added to the list based on vague, broad, and error-prone standards.
  • The No Fly List is only the best known of the government’s web of terrorism watchlists. Many more exist, derived from the same master list.  Currently, there are more than one million names in the Terrorist Identities Datamart Environment, a database maintained by the National Counterterrorism Center. This classified source feeds the Terrorist Screening Database (TSDB), operated by the FBI’s Terrorist Screening Center. The TSDB is an unclassified but still secret list known as the “master watchlist.” containing what the government describes as “known or suspected terrorists,” or KSTs.
  • Nothing encapsulates the post-9/11, Alice-in-Wonderland inversion of American notions of due process more strikingly than this “blacklist first, innocence later... maybe” mindset. The Terrorist Screening Database is then used to fill other lists. In the context of aviation, this means the no-fly list, as well as the selectee and expanded selectee lists. Transportation security agents subject travelers on the latter two lists to extra screenings, which can include prolonged and invasive interrogation and searches of laptops, phones, and other electronic devices. Around the border, there’s the State Department’s Consular Lookout and Support System, which it uses to flag people it thinks shouldn’t get a visa, and the TECS System, which Customs and Border Protection uses to determine whether someone can enter the country.
  • According to documents recently leaked to the Intercept, as of August 2013 that master watchlist contained 680,000 people, including 5,000 U.S. citizens and legal permanent residents. The government can add people’s names to it according to a shaky “reasonable suspicion” standard. There is, however, growing evidence that what’s “reasonable” to the government may only remotely resemble what that word means in everyday usage. Information from a single source, even an uncorroborated Facebook post, can allow a government agent to watchlist an individual with virtually no outside scrutiny. Perhaps that’s why 40% of those on the master watchlist have “no recognized terrorist group affiliation,” according to the government’s own records.
  • This opens up the possibility of increased surveillance and tense encounters with the police, not to speak of outright harassment, for a large but undivulged number of people. When a police officer stops a person for a driving infraction, for instance, information about his or her KST status will pop up as soon a driver’s license is checked.  According to FBI documents, police officers who get a KST hit are warned to “approach with caution” and “ask probing questions.” When officers believe they’re about to go face to face with a terrorist, bad things can happen. It’s hardly a stretch of the imagination, particularly after a summer of police shootings of unarmed men, to suspect that an officer approaching a driver whom he believes to be a terrorist will be quicker to go for his gun. Meanwhile, the watchlisted person may never even know why his encounters with police have taken such a peculiar and menacing turn. According to the FBI's instructions, under no circumstances is a cop to tell a suspect that he or she is on a watchlist.
  • Inside the United States, no watchlist may be as consequential as the one that goes by the moniker of the Known or Appropriately Suspected Terrorist File. The names on this blacklist are shared with more than 17,000 state, local, and tribal police departments nationwide through the FBI’s National Crime Information Center (NCIC). Unlike any other information disseminated through the NCIC, the KST File reflects mere suspicion of involvement with criminal activity, so law enforcement personnel across the country are given access to a database of people who have secretly been labeled terrorism suspects with little or no actual evidence, based on virtually meaningless criteria.
  • And once someone is on this watchlist, good luck getting off it. According to the government’s watchlist rulebook, even a jury can’t help you. “An individual who is acquitted or against whom charges are dismissed for a crime related to terrorism,” it reads, “may nevertheless meet the reasonable standard and appropriately remain on, or be nominated to, the Terrorist Watchlist.” No matter the verdict, suspicion lasts forever.
  • The SARs program and the consolidated terrorism watchlist are just two domestic government databases of suspicion. Many more exist. Taken together, they should be seen as a new form of national ID for a growing group of people accused of no crime, who may have done nothing wrong, but are nevertheless secretly labeled by the government as suspicious or worse. Innocent until proven guilty has been replaced with suspicious until determined otherwise. Think of it as a new shadow system of national identification for a shadow government that is increasingly averse to operating in the light. It’s an ID its “owners” don’t carry around with them, yet it’s imposed on them whenever they interact with government agents or agencies. It can alter their lives in disastrous ways, often without their knowledge. And they could be you. If this sounds dystopian, that’s because it is.
Paul Merrell

Running for Cover: A Sham Air Force Summit Can't Fix the Close Air Support Gap Created by Dumping the A-10 - 0 views

  • “I can’t wait to be relieved of the burdens of close air support,” Major General James Post, the vice commander of Air Combat Command (ACC), allegedly told a collection of officers at a training session in August 2014. As with his now notorious warning that service members would be committing treason if they communicated with Congress about the successes of the A-10, Major General Post seems to speak for the id of Air Force headquarters’ true hostility towards the close air support (CAS) mission. Air Force four-stars are working hard to deny this hostility to the public and Congress, but their abhorrence of the mission has been demonstrated through 70 years of Air Force headquarters’ budget decisions and combat actions that have consistently short-changed close air support. For the third year in a row (many have already forgotten the attempt to retire 102 jets in the Air Force’s FY 2013 proposal), the Air Force has proposed retiring some or all of the A-10s, ostensibly to save money in order to pay for “modernization.” After failing to convince Congress to implement their plan last year (except for a last minute partial capitulation by retiring Senate and House Armed Services Committee chairmen Senator Carl Levin (D-MI) and Representative Buck McKeon (R-CA)) and encountering uncompromising pushback this year, Air Force headquarters has renewed its campaign with more dirty tricks.
  • First, Air Force headquarters tried to fight back against congressional skepticism by releasing cherry-picked data purporting to show that the A-10 kills more friendlies and civilians than any other U.S. Air Force plane, even though it actually has one of the lowest fratricide and civilian casualty rates. With those cooked statistics debunked and rejected by Senate Armed Services Chairman Senator John McCain (R-AZ), Air Force headquarters hastily assembled a joint CAS “Summit” to try to justify dumping the A-10. Notes and documents from the Summit meetings, now widely available throughout the Air Force and shared with the Project On Government Oversight’s Center for Defense Information (CDI), reveal that the recommendations of the Summit working groups were altered by senior Air Force leaders to quash any joint service or congressional concerns about the coming gaps in CAS capabilities. Air Force headquarters needed this whitewash to pursue, yet again, its anti-A-10 crusade without congressional or internal-Pentagon opposition.
  • The current A-10 divestment campaign, led by Air Force Chief of Staff Mark Welsh, is only one in a long chain of Air Force headquarters’ attempts by bomber-minded Air Force generals to get rid of the A-10 and the CAS mission. The efforts goes as far back as when the A-10 concept was being designed in the Pentagon, following the unfortunate, bloody lessons learned from the Vietnam War. For example, there was a failed attempt in late-1980s to kill off the A-10 by proposing to replace it with a supposedly CAS-capable version of the F-16 (the A-16). Air Force headquarters tried to keep the A-10s out of the first Gulf War in 1990, except for contingencies. A token number was eventually brought in at the insistence of the theater commander, and the A-10 so vastly outperformed the A-16s that the entire A-16 effort was dismantled. As a reward for these A-10 combat successes, Air Force headquarters tried to starve the program by refusing to give the A-10 any funds for major modifications or programmed depot maintenance during the 1990s. After additional combat successes in the Iraq War, the Air Force then attempted to unload the A-10 fleet in 2004.
  • ...12 more annotations...
  • To ground troops and the pilots who perform the mission, the A-10 and the CAS mission are essential and crucial components of American airpower. The A-10 saves so many troop lives because it is the only platform with the unique capabilities necessary for effective CAS: highly maneuverable at low speeds, unmatched survivability under ground fire, a longer loiter time, able to fly more sorties per day that last longer, and more lethal cannon passes than any other fighter. These capabilities make the A-10 particularly superior in getting in close enough to support our troops fighting in narrow valleys, under bad weather, toe-to-toe with close-in enemies, and/or facing fast-moving targets. For these reasons, Army Chief of Staff General Ray Odierno has called the A-10 “the best close air support aircraft.” Other Air Force platforms can perform parts of the mission, though not as well; and none can do all of it. Senator Kelly Ayotte (R-NH) echoed the troops’ combat experience in a recent Senate Armed Services committee hearing: “It's ugly, it's loud, but when it comes in…it just makes a difference.”
  • In 2014, Congress was well on the way to roundly rejecting the Air Force headquarters’ efforts to retire the entire fleet of 350 A-10s. It was a strong, bipartisan demonstration of support for the CAS platform in all four of Congress’s annual defense bills. But in the final days of the 113th Congress, a “compromise” heavily pushed by the Air Force was tucked into the National Defense Authorization Act for FY 2015. The “compromise” allowed the Air Force to move A-10s into virtually retired “backup status” as long as the Cost Assessment and Program Evaluation (CAPE) office in DoD certified that the measure was the only option available to protect readiness. CAPE, now led by former Assistant Secretary of the Air Force for Financial Management and Comptroller Jamie Morin, duly issued that assessment—though in classified form, thus making it unavailable to the public. In one of his final acts as Secretary of Defense, Chuck Hagel then approved moving 18 A-10s to backup status.
  • The Air Force intends to replace the A-10 with the F-35. But despite spending nearly $100 billion and 14 years in development, the plane is still a minimum of six years away from being certified ready for any real—but still extremely limited—form of CAS combat. The A-10, on the other hand, is continuing to perform daily with striking effectiveness in Afghanistan, Iraq, and Syria—at the insistence of the CENTCOM commander and despite previous false claims from the Air Force that A-10s can’t be sent to Syria. A-10s have also recently been sent to Europe to be available for contingencies in Ukraine—at the insistence of the EUCOM Commander. These demands from active theaters are embarrassing and compelling counterarguments to the Air Force’s plea that the Warthog is no longer relevant or capable and needs to be unloaded to help pay for the new, expensive, more high-tech planes that Air Force headquarters vastly prefers even though the planes are underperforming.
  • So far, Congress has not been any more sympathetic to this year’s continuation of General Welsh’s campaign to retire the A-10. Chairman McCain rejected the Air Force’s contention that the F-35 was ready enough to be a real replacement for the A-10 and vowed to reverse the A-10 retirement process already underway. Senator Ayotte led a letter to Defense Secretary Ashton Carter with Senators Tom Cotton (R-AR), Lindsey Graham (R-SC), Thom Tillis (R-NC), Roger Wicker (R-MS), Mike Crapo (R-ID), Johnny Isakson (R-GA), and Richard Burr (R-NC) rebuking Hagel’s decision to place 18 A-10s in backup inventory. Specifically, the Senators called the decision a “back-door” divestment approved by a “disappointing rubber stamp” that guts “the readiness of our nation’s best close air support aircraft.” In the House, Representative Martha McSally (R-AZ) wrote to Secretary Carter stating that she knew from her own experience as a former A-10 pilot and 354th Fighter Squadron commander that the A-10 is uniquely capable for combat search and rescue missions, in addition to CAS, and that the retirement of the A-10 through a classified assessment violated the intent of Congress’s compromise with the Air Force:
  • Some in the press have been similarly skeptical of the Air Force’s intentions, saying that the plan “doesn’t add up,” and more colorfully, calling it “total bullshit and both the American taxpayer and those who bravely fight our wars on the ground should be furious.” Those reports similarly cite the Air Force’s longstanding antagonism to the CAS mission as the chief motive for the A-10’s retirement.
  • By announcing that pilots who spoke to Congress about the A-10 were “committing treason,” ACC Vice Commander Major General James Post sparked an Inspector General investigation and calls for his resignation from POGO and other whistleblower and taxpayer groups. That public relations debacle made it clear that the Air Force needed a new campaign strategy to support its faltering A-10 divestment campaign. On the orders of Air Force Chief of Staff General Mark Welsh, General Herbert “Hawk” Carlisle—the head of Air Combat Command—promptly announced a joint CAS Summit, allegedly to determine the future of CAS. It was not the first CAS Summit to be held (the most recent previous Summit was held in 2009), but it was the first to receive so much fanfare. As advertised, the purpose of the Summit was to determine and then mitigate any upcoming risks and gaps in CAS mission capabilities. But notes, documents, and annotated briefing slides reviewed by CDI reveal that what the Air Force publicly released from the Summit is nothing more than a white-washed assessment of the true and substantial operational risks of retiring the A-10.
  • Just prior to the Summit, a working group of approximately 40 people, including CAS-experienced Air Force service members, met for three days at Davis-Monthan Air Force Base to identify potential risks and shortfalls in CAS capabilities. But Air Force headquarters gave them two highly restrictive ground rules: first, assume the A-10s are completely divested, with no partial divestments to be considered; and second, assume the F-35 is fully CAS capable by 2021 (an ambitious assumption at best). The working groups included A-10 pilots, F-16 pilots, and Joint Terminal Attack Controllers (JTACs), all with combat-based knowledge of the CAS platforms and their shortfalls and risks. They summarized their findings with slides stating that the divestment would “cause significant CAS capability and capacity gaps for 10 to 12 years,” create training shortfalls, increase costs per flying hour, and sideline over 200 CAS-experienced pilots due to lack of cockpits for them. Additionally, they found that after the retirement of the A-10 there would be “very limited” CAS capability at low altitudes and in poor weather, “very limited” armor killing capability, and “very limited” ability to operate in the GPS-denied environment that most experts expect when fighting technically competent enemies with jamming technology, an environment that deprives the non-A-10 platforms of their most important CAS-guided munition. They also concluded that even the best mitigation plans they were recommending would not be sufficient to overcome these problems and that significant life-threatening shortfalls would remain.
  • General Carlisle was briefed at Davis-Monthan on these incurable risks and gaps that A-10 divestment would cause. Workshop attendees noted that he understood gaps in capability created by retiring the A-10 could not be solved with the options currently in place. General Carlisle was also briefed on the results of the second task to develop a list of requirements and capabilities for a new A-X CAS aircraft that could succeed the A-10. “These requirements look a lot like the A-10, what are we doing here?” he asked. The slides describing the new A-X requirements disappeared from subsequent Pentagon Summit presentations and were never mentioned in any of the press releases describing the summit.
  • At the four-day Pentagon Summit the next week, the Commander of the 355th Fighter Wing, Davis-Monthan Air Force Base, Col. James P. Meger, briefed lower level joint representatives from the Army and the Marine Corps about the risks identified by the group at Davis-Monthan. Included in the briefing was the prediction that divestment of the A-10 would result in “significant capability and capacity gaps for the next ten to twelve years” that would require maintaining legacy aircraft until the F-35A was fully operational. After the presentation, an Army civilian representative became concerned. The slides, he told Col. Meger, suggested that the operational dangers of divestment of the A-10 were much greater than had been previously portrayed by the Air Force. Col. Meger attempted to reassure the civilian that the mitigation plan would eliminate the risks. Following the briefing, Col. Meger met with Lt. Gen. Tod D. Wolters, the Deputy Chief of Staff for Operations for Air Force Headquarters. Notably, the Summit Slide presentation for general officers the next day stripped away any mention of A-10 divestment creating significant capability gaps. Any mention of the need to maintain legacy aircraft, including the A-10, until the F-35A reached full operating capability (FOC) was also removed from the presentation.
  • The next day, Col. Meger delivered the new, sanitized presentation to the Air Force Chief of Staff. There was only muted mention of the risks presented by divestment. There was no mention of the 10- to 12-year estimated capability gap, nor was there any mention whatsoever of the need to maintain legacy aircraft—such as the A-10 or less capable alternatives like the F-16 or F-15E—until the F-35A reached FOC. Other important areas of concern to working group members, but impossible to adequately address within the three days at Davis-Monthan, were the additional costs to convert squadrons from the A-10 to another platform, inevitable training shortfalls that would be created, and how the deployment tempos of ongoing operations would further exacerbate near-term gaps in CAS capability. To our knowledge, none of these concerns surfaced during any part of the Pentagon summit.
  • Inevitably, the Air Force generals leading the ongoing CAS Summit media blitz will point congressional Armed Services and Appropriations committees to the whitewashed results of their sham summit. When they do, Senators and Representatives who care about the lives of American troops in combat need to ask the generals the following questions: Why wasn’t this summit held before the Air Force decided to get rid of A-10s? Why doesn’t the Air Force’s joint CAS summit include any statement of needs from soldiers or Marines who have actually required close air support in combat? What is the Air Force’s contingency plan for minimizing casualties among our troops in combat in the years after 2019, if the F-35 is several years late in achieving its full CAS capabilities? When and how does the Air Force propose to test whether the F-35 can deliver close support at least as combat-effective as the A-10’s present capability? How can that test take place without A-10s? Congress cannot and should not endorse Air Force leadership’s Summit by divesting the A-10s. Instead, the Senate and House Armed Services Committees need to hold hearings that consider the real and looming problems of inadequate close support, the very problems that Air Force headquarters prevented their Summit from addressing. These hearings need to include a close analysis of CAPE’s assessment and whether the decision to classify its report was necessary and appropriate. Most importantly, those hearings must include combat-experienced receivers and providers of close support who have seen the best and worst of that support, not witnesses cherry-picked by Air Force leadership—and the witnesses invited must be free to tell it the way they saw it.
  • If Congress is persuaded by the significant CAS capability risks and gaps originally identified by the Summit’s working groups, they should write and enforce legislation to constrain the Air Force from further eroding the nation’s close air support forces. Finally, if Congress believes that officers have purposely misled them about the true nature of these risks, or attempted to constrain service members’ communications with Congress about those risks, they should hold the officers accountable and remove them from positions of leadership. Congress owes nothing less to the troops they send to fight our wars.
  •  
     Though not touched on in the article, the real problem is that the A10 has no proponents at the higher ranks of the Air Force because it is already bought and paid for; there's nothing in the A10 for the big Air Force aircraft manufacturing defense contractors. The F35, on the other hand is, is a defense contractor wet dream. It's all pie in the sky and big contracts just to get the first one in the air, let alone outfit it with the gear and programming needed to use it to inflict harm. It's been one cost-overrun after another and delay after delay. It's a national disgrace that has grown to become the most expensive military purchase in history. And it will never match the A10 for the close air support role. It's minimum airspeed is too high and its close-in maneuverability will be horrible. The generals, of course, don't want to poison the well for their post-military careers working for the defense contractors by putting a halt to the boondobble. Their answer: eliminate the close air support mission for at least 10-12 years and then attempt it with the F35.   As a former ground troop, that's grounds for the Air Force generals' court-martial and dishonorable discharge. I would not be alive today were it not for close air support. And there are tens of thousands of veterans who can say that in all truth. The A10 wasn't available back in my day, but by all reports its the best close air support weapons platform ever developed. It's a tank killer and is heavily armored, with redundant systems for pilot and aircraft survivability. The A10 is literally built around a 30 mm rotary cannon that fires at 3,900 rounds per minute. It also carries air to ground rockets and is the only close air support aircraft still in the U.S. arsenal. Fortunately, John McCain "get it" on the close air support mission and has managed to mostly protect the A10 from the generals. If you want to learn  more about the F35 scandal, try this Wikipedia article section; although it's enoug
« First ‹ Previous 41 - 60 of 109 Next › Last »
Showing 20 items per page