Roubini Warns of ‘Perfect Storm’ for U.S. Economy in 2020

Not exactly a surprise. Supply-side “solutions” used to justify tax breaks for corporations and the wealthy have never resulted in anything other than recession. Roubini explains his analysis more clearly and thoroughly than I might. Watch the video. Bloomberg has blocked linking directly; but, you can click through to YouTube.

Yes, Roubini’s a conservative economist. In this instance, his prediction of doom and gloom is founded on the track record of Republicans who try this every decade or so – and fail each time.

Bipartisan [remember that?] bill, written by a Democrat [imagine that?] restricting Trump’s ability to wage war OK’d by House committee


Click to enlargeAP/Andrew Harnik

❝ A House committee has earned a rare bipartisan round of applause for beginning to roll back the US president’s ability to wage war.

❝ The House Appropriations Committee recently approved an amendment to revoke the Authorization for Use of Military Force, which allows the president to undertake war against al-Qaeda and its affiliates without Congressional approval. The law, passed shortly after the terrorist attacks of 11 September, 2001, has been used to approve conflicts in Afghanistan, Iraq, and Syria.

The new amendment, introduced by Democratic Representative Barbara Lee, would sunset these presidential powers eight weeks after Congress passes the 2018 defence spending budget. The appropriations committee has sent the budget to the House floor for a vote.

❝ A visibly surprised Ms Lee welcomed the addition of the amendment on Thursday, condemning the AUMF as “a blank check to wage war anywhere, at any time, and for any length”.

The AUMF has been used to justify military action more than 37 times in 14 countries since 2001, according to the Congressional Research Service…

❝ “This issue is more urgent given the erratic behaviour and inexperience of our current Commander-in-Chief,” Ms Lee said. “No president should have a blank check for endless war, least of all President Donald Trump.”

Members of Congress were falling over each other to pass this bill in 2001 – excepting Barbara Lee, the sole vote against its passage. She understood and declared the foolishness of a bill so broad and unchecked it would be used [and was] by any president for any war they wished for.

I wish her well trying to shepherd her sanity through the rest of a Congress notable for cowardice and capitulation to religion, bigotry and corporate pimps. I compliment the members of the House Appropriations Committee for doing exactly what they are chartered to do.

News orgs demand DOJ release secret rules targeting journalists with gag order National Security Letters

Freedom of the Press Foundation recently filed a huge brief in the organization’s case demanding that the Justice Department release its secret rules for targeting journalists with National Security Letters…A coalition of 37 news organizations – including the New York Times, The Associated Press, USA Today, Buzzfeed, and tons more – filed an amicus brief in support of the Freedom of the Press Foundation case, demanding that the Department of Justice do the same…

NSLs are controversial (and unconstitutional) surveillance tools that allow the FBI to collect private information in national security cases without any involvement whatsoever from judges or courts. FPF filed a Freedom of Information Act lawsuit in 2015 demanding their secret rules for using NSLs on members of the media, and Reporter’s Committee for Freedom of the Press filed the amicus brief on behalf of the thirty seven news organization…

In response to our lawsuit, the Justice Department released to us some documents in December 2015 that confirmed that these secret rules do, in fact, exist. However the agency refused to release the specific rules or even acknowledge where the actual rules are located — even though we already know they appear in the classified annex of the FBI’s Department Investigations and Operations Guide, which is published in redacted form on the FBI’s website…

By exempting National Security Letters (and potentially FISA court orders) from their media guidelines, the Justice Department makes a mockery of the supposed restrictions. Because almost every leak investigation involving the media involves national security, the FBI and DOJ can simply use NSLs to freely get much of the information they would otherwise need to comply with strict rules to get — all in complete secrecy and without any oversight.

Our government and its alphabet soup of spies simply rewrite their way around constitutional protections every time they are caught snooping illegally.

True – a lot a of this corruption started with the Bush Administration’s so-called Patriot Act. National Security Letters containing gag orders are a particularly malevolent police state tool. You can’t tell anyone you’re even being investigated or contacted. But, the Obama Administration hasn’t changed the rules regardless of their public chatter about a return to constitutional law.

Donald Rumsfeld knew what we weren’t told about Iraq

On September 9, 2002, as the George W. Bush administration was launching its campaign to invade Iraq, a classified report landed on the desk of the chairman of the Joint Chiefs of Staff. It came from Defense Secretary Donald Rumsfeld, and it carried an ominous note.

“Please take a look at this material as to what we don’t know about WMD,” Rumsfeld wrote to Air Force General Richard Myers. “It is big.”

The report was an inventory of what U.S. intelligence knew—or more importantly didn’t know—about Iraqi weapons of mass destruction. Its assessment was blunt: “We’ve struggled to estimate the unknowns. … We range from 0% to about 75% knowledge on various aspects of their program.”

Myers already knew about the report. The Joint Staff’s director for intelligence had prepared it, but Rumsfeld’s urgent tone said a great deal about how seriously the head of the Defense Department viewed the report’s potential to undermine the Bush administration’s case for war. But he never shared the eight-page report with key members of the administration such as then-Secretary of State Colin Powell or top officials at the CIA…Instead, the report disappeared…

While the threat posed by a nuclear-armed Iraq was at the heart of the administration’s case for war, the JCS report conceded: “Our knowledge of the Iraqi (nuclear) weapons program is based largely — perhaps 90% — on analysis of imprecise intelligence.”

The rationale for the invasion has long since been discredited, but the JCS report, now declassified, which a former Bush administration official forwarded in December, nevertheless has implications for both sides in the 2016 presidential race, in particular the GOP candidates who are relying for foreign policy advice on some of the architects of the war, and the Democratic front-runner, who once again is coming under fire from her primary opponent for supporting the invasion.

For these two sets of reasons RTFA. Corrupt policies are repeated many times in the history of our nation because an ignorant electorate may as well be uncaring. We trust too much, too often, in the truthfulness of elected and appointed officials. Often, in more than one administration supposedly in principled opposition.

Yale researcher follows the money that runs the climate denial network


ALEC/Bush flunky Michael Leavitt in 2004AP Photo/Elaine Thompson

This week, Justin Farrell, a professor at the Yale School of Forestry and Environmental Studies, released a comprehensive report in Nature Climate Change detailing just who these people opposing climate action are, where their funding comes from, and how the groups they work through are interrelated. Eric Roston reports for Bloomberg:

A loose network of 4,556 individuals with overlapping ties to 164 organizations do the most to dispute climate change in the U.S., according to a paper published today in Nature Climate Change. ExxonMobil and the family foundations controlled by Charles and David Koch emerge as the most significant sources of funding for these skeptics. As a two-week United Nations climate summit begins today in Paris, it’s striking to notice that a similarly vast infrastructure of denial isn’t found in any other nation.

The role of ExxonMobil and the Kochs in influencing climate denial hadn’t been empirically studied before now, according to Justin Farrell, an assistant professor of sociology at the Yale School of Forestry & Environmental Studies and the author of the new paper. He said the flow of money from group to group and person to person is often opaque to researchers.

ExxonMobil has maintained for years that it does not fund denial of climate change. A spokesman pointed out that the company’s $100 million founding commitment to Stanford University’s Global Climate & Energy Project was made in 2002, right in the middle of the period covered by the Nature Climate Change study. Representatives for any of the Koch family foundations could not be reached for comment.

Farrell said he focused on ExxonMobil and the Koch foundations because “they are reliable indicators of a much larger effort of corporate lobbying in the climate change counter-movement.” He examined Internal Revenue Service data showing which groups in the network of climate contrarians accepted funding from ExxonMobil or Koch foundations between 1993 and 2013. Recipients from those two sources tend to occupy central nodes in what he calls a “contrarian network.” Groups funded by ExxonMobil or the Kochs “have greater influence over flows of resources, communication, and the production of contrarian information,” Farrell wrote.

You can read more about this study – and more – at Bloomberg.

NSA prepares for cyberwar. Their cyberwar.


Pleasant working conditions, clean air, good pay and no ethical standards whatsoever

According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money.

During the 20th century, scientists developed so-called ABC weapons — atomic, biological and chemical. It took decades before their deployment could be regulated and, at least partly, outlawed. New digital weapons have now been developed for the war on the Internet. But there are almost no international conventions or supervisory authorities for these D weapons, and the only law that applies is the survival of the fittest…

The US Army, Navy, Marines and Air Force have already established their own cyber forces, but it is the NSA, also officially a military agency, that is taking the lead. It’s no coincidence that the director of the NSA also serves as the head of the US Cyber Command. The country’s leading data spy, Admiral Michael Rogers, is also its chief cyber wagrrior and his close to 40,000 employees are responsible for both digital spying and destructive network attacks.

From a military perspective, surveillance of the Internet is merely “Phase 0” in the US digital war strategy. Internal NSA documents indicate that it is the prerequisite for everything that follows. They show that the aim of the surveillance is to detect vulnerabilities in enemy systems. Once “stealthy implants” have been placed to infiltrate enemy systems, thus allowing “permanent accesses,” then Phase Three has been achieved — a phase headed by the word “dominate” in the documents. This enables them to “control/destroy critical systems & networks at will through pre-positioned accesses (laid in Phase 0).” Critical infrastructure is considered by the agency to be anything that is important in keeping a society running: energy, communications and transportation. The internal documents state that the ultimate goal is “real time controlled escalation”.

But, our Commander-in-Chief says that United States is a victim of constant assaults. We muct prepare for cyber warfare. We must obey.

Warning, warning, Will Robinson.

Meanwhile, like every other aspect of the most militarized imperial economy in the history of our world – the United States dedicates more energy, funds and propoganda to our own assault on privacy than the sum of the rest of the world. No doubt.

RTFA. Lots of detail. A strong piece of research based – once again – on the crimes committed in our name, for our “defense” by politicians and their wooden-hearted puppets.

We may never find aliens if they’re hip to encryption

snowden tv

Edward Snowden has strongly defended citizens’ rights to encrypt their messages, and has taught journalists how to use encryption to protect themselves from spying programs.

But the NSA whistleblower sees a downside to encrypting so much information: aliens may not be able to spot signs of intelligent life.

Snowden, appearing on Neil deGrasse Tyson’s StarTalk podcast via a video link from Moscow on Sept. 18, told the astrophysicist how encryption could interfere in our attempts at alien communication.

Done properly, encrypted communication—encoded so that only the intended recipient can read the information—can’t be identified and is indistinguishable from random behavior, Snowden said.

“So if you have an alien civilization trying to listen for other civilizations, or our civilization trying to listen for aliens, there’s only one small period in the development of their society when all of their communication will be sent via the most primitive and most unprotected means,” Snowden said. “So what we are hearing that’s actually an alien television show or, you know, a phone call … is indistinguishable to us from cosmic microwave background radiation.”

Although as Tyson noted on his podcast, alien species might not be so keen on encryption. “Only if they have the same security problems as us,” he told Snowden.

You might hope that some other species with sufficient advancement in science to track down our wee ball of mud in the night sky – might also have moved to social development more reliant upon science and less dependent on superstition and imperial amorality. And may have grown beyond our need for encryption.