Sunday, June 04, 2006

Persons, Houses, Papers and Effects

Once Again It's Legal Because Bush Says It Is


Reaching into homes and businesses across the nation, amassing information about the calls of ordinary Americans — most of whom aren't suspected of any crime. The NSA program does not involve the NSA listening to or recording conversations. The spy agency claims to be using the data to analyze calling patterns in an effort to detect terrorist activity.


"It's the largest database ever assembled in the world," said one person, who, like the others who agreed to talk about the NSA's activities, declined to be identified by name or affiliation. The agency's goal is "to create a database of every call ever made" within the nation's borders, this person added.


Last year, Bush authorized the NSA to eavesdrop — without warrants — on international calls and international e-mails of people suspected of having links to terrorists when one party to the communication is in the USA. Nor have warrants been used in the NSA's efforts to create a national call database.


According to the President the NSA is focused exclusively on international calls. "In other words," Bush explained, "one end of the communication must be outside the United States." Domestic call records — those of calls that originate and terminate within U.S. borders — were by implication private.


The implication is not the case. Through records of billions of domestic calls, the NSA has a window into the habits of millions of Americans. Names and other personal information are, supposedly, not being handed over , but the records can be cross-referenced with other databases to obtain that information.


"There is no domestic surveillance without court approval," said Dana Perino, White House deputy press secretary, referring to actual eavesdropping.


She added that all national intelligence activities undertaken by the federal government "are lawful, necessary and required for the pursuit of al-Qaeda and affiliated terrorists." All government-sponsored intelligence activities "are carefully reviewed and monitored," Perino said. She also noted that "all appropriate members of Congress have been briefed on the intelligence efforts of the United States."


Unfortunately, the reviewing and monitoring are being done by the same people who are collecting and using the information. You have to judge how likely it is that they'll find their own actions unlawful.


The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.


Do you think the Fourth Amendment ranks very high on their agenda?


Maybe, since they're not seeking warrants, or swearing any oaths, nor particularly describing places to be searched or persons and things to be siezed, they think they're complying with the Constitution, in the breach and by omission, collecting "external" data on domestic phone calls but not intercepting "internals," the actual content of the communication. Data collection from phone companies is not uncommon; it's been done before. The data are used for "social network analysis," to study how terrorist networks contact each other and how they are tied together.

Do you think they need billions of records, of millions of citizens to analyze those networks?


Are we all suspect, until proven loyal to the President?


And can someone tell me why there are three hundred and twenty-five thousand names on the terrorist watch list?


Or why it includes U.S. Senators, infants and senior citizens not charged, chargeable or even suspected of any crime at all?


The only hole in the NSA's database may be Qwest's refusal to participate. Qwest provides local phone service to 14 million customers in 14 states in the West and Northwest. But AT&T and Verizon also provide some services — primarily long-distance and wireless — to people who live in Qwest's region. Therefore, they can provide the NSA with at least some access in that area.


The NSA is charged with protecting the United States from foreign security threats. Once the agency was so secret the government refused to even confirm its existence. Insiders joked that NSA stood for "No Such Agency."


In 1975 congressional investigation revealed that the NSA had been intercepting, without warrants, international communications for more than 20 years at the behest of the CIA and other agencies. The spy campaign, code-named "Shamrock," led to the Foreign Intelligence Surveillance Act (FISA), which was designed to protect Americans from illegal eavesdropping.


Enacted in 1978, FISA lays out procedures that the U.S. government must follow to conduct electronic surveillance and physical searches of people believed to be engaged in espionage or international terrorism against the United States. A special court, which has 11 members, is responsible for adjudicating requests under FISA.


Code-breaking has continued to improve in parallel with technology. Today the agency is expert in the practice of "data mining" — sifting through reams of information in search of patterns — one of many tools analysts and mathematicians use to crack codes and track communications.


Paul Butler, a former U.S. prosecutor who specialized in terrorism crimes, said FISA approval generally isn't necessary for government data-mining operations. "FISA does not prohibit the government from doing data mining," said Butler, now a partner with the law firm Akin Gump Strauss Hauer & Feld in Washington, D.C.


The caveat, he said, is that "personal identifiers" — such as names, Social Security numbers and street addresses — can't be included as part of the search. "That requires an additional level of probable cause," he said.


The usefulness of the domestic phone-call database as a counterterrorism tool is unclear. Also unclear is whether the database has been used for other purposes.


They probably, lawfully, had the information needed on September 10, 2006 to thwart the attack on September 11th . What they didn't have were enough arabic, pashto, and farsi speaking analysts. Despite all warnings, despite previous attacks, they didn't take a band of fanatics seriously.


And still don't. We're so busy worrying about governments that the Taliban is resurgent in Afghanistan and insurgents have free reign from Iraq to Pakistan, from Madrid ,to Mogadishu, to the London subway system.


Local and regional phone companies have, in the past, required law enforcement agencies to present a court order before they would consider turning over a customer's calling data. That was innate in the personality of the old Bell Telephone System, out of which those companies grew.




NEW YORK -- Former National Security Agency director Bobby Ray Inman lashed out at the Bush administration Monday night over its continued use of warrantless domestic wiretaps, making him one of the highest-ranking former intelligence officials to criticize the program in public, analysts say.


"This activity is not authorized," Inman said, as part of a panel discussion on eavesdropping that was sponsored by The New York Public Library. The Bush administration "need(s) to get away from the idea that they can continue doing it."


Since the NSA eavesdropping program was unveiled in December, Inman -- like other senior members of the intelligence community -- has been measured in the public statements he's made about the agency he headed under President Jimmy Carter. He maintained that his former colleagues "only act in accordance with law." When asked whether the president had the legal authority to order the surveillance, Inman replied in December, "Someone else would have to give you the good answer."


But sitting in a brightly lit basement auditorium at the library next to James Risen, the New York Times reporter who broke the surveillance story, Inman's tone changed. He called on the president to "walk into the modern world" and change the law governing the wiretaps -- or abandon the program altogether.


"The program has drawn a lot of criticism, but thus far former military and intelligence officials have not spoken up. To have Adm. Inman -- the former head of the NSA -- (come) forward with this critique is significant," said Patrick Radden Keefe, author of Chatter: Dispatches From the Secret World of Global Eavesdropping, who sat on the panel with Inman and Risen. "Because of the secrecy surrounding this type of activity, much of the criticism has come from outsiders who don't have a firm grasp of the mechanics and the utility of electronic intelligence. Inman knows whereof he speaks."


In 1978, Inman helped spearhead the effort to pass the Foreign Intelligence Surveillance Act, or FISA, which makes it illegal to eavesdrop on American citizens without court approval. Inman said he wouldn't have a problem sidestepping that law -- as a "limited response to an emergency situation," like the terror attacks of Sept. 11, 2001. But nearly five years since those strikes, the NSA is continuing to track phone calls and e-mails without warrants.


Inman didn't contest the Bush administration's claim that the FISA courts can't keep up with the NSA's new breed of surveillance. "My problem is not going to Congress to revise the statute to deal with the problems I didn't think of in '78," Inman said. "We can do what the country needs and work within the law."


The bedrock principle — protection of the customer — guided the company for decades. Gene Kimmelman, senior public policy director of Consumers Union said, "No court order, no customer information — period. That's how it was for decades."


Concern was based on law: Under Section 222 of the Communications Act, first passed in 1934, telephone companies are prohibited from giving out information regarding their customers' calling habits: whom a person calls, how often and what routes those calls take to reach their final destination. Inbound calls, as well as wireless calls, also are covered.


The financial penalties for violating Section 222 can be stiff. The Federal Communications Commission, the nation's top telecommunications regulatory agency, can levy fines of up to $130,000 per day per violation, with a cap of $1.325 million per violation. The FCC has no hard definition of "violation." In practice, that means a single "violation" could cover one customer or 1 million.


NSA representatives approached the nation's biggest telecommunications companies soon after the Sept. 11 attacks. The agency made an urgent pitch: National security is at risk, and we need your help to protect the country from attacks.They were told that it wanted their "call-detail records," a complete listing of the calling histories of their millions of customers. Plus, the NSA wanted the carriers to provide updates, which would enable the agency to keep tabs on the nation's calling habits.


Joe Nacchio, Qwest's CEO at the time, was extremely troubled by the NSA's claim that Qwest didn't need a court's order or approval — under FISA. Qwest was unsure about who would access its customers' information and how their information might be used.


Financial consequences were also a concern. Illegally divulging calling information can be subject to heavy fines. The NSA was asking Qwest to turn over millions of records. The fines could be enormous.


Other government agencies, including the FBI, CIA and DEA, might also have access to the data. The NSA regularly shares information — known as "product" in intelligence circles — with other intelligence groups. Qwest's lawyers were worried by the extent of the NSA request.


To pressure Qwest, NSA representatives told Qwest that it was the lone holdout among the major telecommunications companies. It tried appealing to Qwest's patriotic side: In one meeting, an NSA representative suggested that Qwest's refusal to contribute to the database could compromise national security, then suggested that Qwest's foot-dragging could affect its ability to get future classified work with the government. Qwest had classified contracts and hoped to get more.


Qwest's lawyers asked NSA to take its proposal to the FISA court. The agency refused. "They told (Qwest) they didn't want to do that because FISA might not agree with them," one person recalled. For similar reasons, this person said, NSA rejected Qwest's suggestion of getting a letter of authorization from the U.S. attorney general's office. A second person confirmed this version of events.”


The NSA record collection program


Excerpts From: Why Data Mining Won't Stop Terror

By Bruce Schneier
Wired News
March 9, 2005

…Many believe data mining is the crystal ball that will enable us to uncover future terrorist plots. But even in the most wildly optimistic projections, data mining isn't tenable for that purpose. We're not trading privacy for security; we're giving up privacy and getting no security in return.

Most people first learned about data mining in November 2002, when news broke about a massive government data mining program called Total Information Awareness. The basic idea was as audacious as it was repellent: suck up as much data as possible about everyone, sift through it with massive computers, and investigate patterns that might indicate terrorist plots.

Americans across the political spectrum denounced the program, and in September 2003, Congress eliminated its funding and closed its offices.

But TIA didn't die. According to The National Journal, it just changed its name and moved inside the Defense Department.

This shouldn't be a surprise. In May 2004, the General Accounting Office published a report (.pdf) listing 122 different federal government data-mining programs that used people's personal information. This list didn't include classified programs, like the NSA's eavesdropping effort or state-run programs like MATRIX.

The promise of data mining is compelling, and convinces many. But it's wrong. We're not going to find terrorist plots through systems like this, and we're going to waste valuable resources chasing down false alarms. To understand why, we have to look at the economics of the system.

Security is always a trade-off, and for a system to be worthwhile, the advantages have to be greater than the disadvantages. A national security data-mining program is going to find some percentage of real attacks and some percentage of false alarms. If the benefits of finding and stopping those attacks outweigh the cost -- in money, liberties, etc. -- then the system is a good one. If not, you'd be better off spending that capital elsewhere.

Data mining works best when you're searching for a well-defined profile, a reasonable number of attacks per year and a low cost of false alarms. Credit-card fraud is one of data mining's success stories: all credit-card companies mine their transaction databases for data for spending patterns that indicate a stolen card.

Many credit-card thieves share a pattern -- purchase expensive luxury goods, purchase things that can be easily fenced, etc. -- and data mining systems can minimize the losses in many cases by shutting down the card. In addition, the cost of false alarms is only a phone call to the cardholder asking him to verify a couple of purchases. The cardholders don't even resent these phone calls -- as long as they're infrequent -- so the cost is just a few minutes of operator time.

Terrorist plots are different. There is no well-defined profile and attacks are very rare. Taken together, these facts mean that data-mining systems won't uncover any terrorist plots until they are very accurate, and that even very accurate systems will be so flooded with false alarms that they will be useless.

All data-mining systems fail in two different ways: false positives and false negatives. A false positive is when the system identifies a terrorist plot that really isn't one. A false negative is when the system misses an actual terrorist plot. Depending on how you "tune" your detection algorithms, you can err on one side or the other: you can increase the number of false positives to ensure you are less likely to miss an actual terrorist plot, or you can reduce the number of false positives at the expense of missing terrorist plots.

To reduce both those numbers, you need a well-defined profile. And that's a problem when it comes to terrorism. In hindsight, it was really easy to connect the 9/11 dots and point to the warning signs, but it's much harder before the fact. Certainly, many terrorist plots share common warning signs, but each is unique, as well. The better you can define what you're looking for, the better your results will be. Data mining for terrorist plots will be sloppy, and it'll be hard to find anything useful.

Data mining is like searching for a needle in a haystack. There are 900 million credit cards in circulation in the United States. According to the FTC September 2003 Identity Theft Survey Report, about 1 percent (10 million) cards are stolen and fraudulently used each year.

When it comes to terrorism, however, trillions of connections exist between people and events -- things that the data-mining system will have to "look at" -- and very few plots. This rarity makes even accurate identification systems useless.

Let's look at some numbers. We'll be optimistic -- we'll assume the system has a one in 100 false-positive rate (99 percent accurate), and a one in 1,000 false-negative rate (99.9 percent accurate). Assume 1 trillion possible indicators to sift through: that's about 10 events -- e-mails, phone calls, purchases, web destinations, whatever -- per person in the United States per day. Also assume that 10 of them are actually terrorists plotting.

This unrealistically accurate system will generate 1 billion false alarms for every real terrorist plot it uncovers. Every day of every year, the police will have to investigate 27 million potential plots in order to find the one real terrorist plot per month. Raise that false-positive accuracy to an absurd 99.9999 percent and you're still chasing 2,750 false alarms per day -- but that will inevitably raise your false negatives, and you're going to miss some of those 10 real plots.

… In statistics, it's called the "base rate fallacy," and it applies in other domains as well. For example, even highly accurate medical tests are useless as diagnostic tools if the incidence of the disease is rare in the general population. Terrorist attacks are also rare, any "test" is going to result in an endless stream of false alarms.

This is exactly the sort of thing we saw with the NSA's eavesdropping program: the New York Times reported that the computers spat out thousands of tips per month. Every one of them turned out to be a false alarm.

And the cost was enormous -- not just for the FBI agents running around chasing dead-end leads instead of doing things that might actually make us safer, but also the cost in civil liberties.…

Data mining can work. It helps Visa keep the costs of fraud down, just as it helps Amazon alert me to books I might want to buy and Google show me advertising I'm more likely to be interested in. But these are all instances where the cost of false positives is low (a phone call from a Visa operator or an uninteresting ad) in systems that have value even if there is a high number of false negatives.

Finding terrorism plots is not a problem that lends itself to data mining. It's a needle-in-a-haystack problem, and throwing more hay on the pile doesn't make that problem any easier. We'd be far better off putting people in charge of investigating potential plots and letting them direct the computers, instead of putting the computers in charge and letting them decide who should be investigated.

The Total Information Awareness Project Lives On

Technology behind the Pentagon's controversial data-mining project has been acquired by NSA, and is probably in use.

By Mark Williams

In April, the Electronic Frontier Foundation (EFF), the advocacy organization for citizens' digital rights, filed evidence to support its class-action lawsuit alleging that telecom giant AT&T gave the National Security Agency (NSA), the ultra-secret U.S. agency that's the world's largest espionage organization, unfettered access to Americans' telephone and Internet communications. The lawsuit is one more episode in the public controversy that erupted in December 2005, when the New York Times revealed that, following September 11, President Bush authorized a far-reaching NSA surveillance program that included warrantless electronic eavesdropping on telephone calls and e-mails of individuals within the United States.

Critics charged that the Bush administration had violated both the Constitution's Fourth Amendment, which protects citizens against unwarranted search or seizure, and the Foreign Intelligence Surveillance Act (FISA) of 1978, which requires eavesdropping warrants to be obtained from a special court of judges empowered for that purpose.

In February 2006, the controversy intensified. Reports emerged that component technologies of the supposedly defunct Total Information Awareness (TIA) project -- established in 2002 by the Pentagon's Defense Advanced Research Projects Agency (DARPA) to develop advanced information technology to counter terrorists, then terminated by Congress in 2003 because of widespread criticism that it would create "Orwellian" mass surveillance -- had been acquired by the NSA.

Washington's lawmakers ostensibly killed the TIA project in Section 8131 of the Department of Defense Appropriations Act for fiscal 2004. But legislators wrote a classified annex to that document which preserved funding for TIA's component technologies, if they were transferred to other government agencies, say sources who have seen the document, according to reports first published in The National Journal. Congress did stipulate that those technologies should only be used for military or foreign intelligence purposes against non-U.S. citizens. Still, while those component projects' names were changed, their funding remained intact, sometimes under the same contracts.

Thus, two principal components of the overall TIA project have migrated to the Advanced Research and Development Activity (ARDA), which is housed somewhere among the 60-odd buildings of "Crypto City," as NSA headquarters in Fort Meade, MD, is nicknamed. One of the TIA components that ARDA acquired, the Information Awareness Prototype System, was the core architecture that would have integrated all the information extraction, analysis, and dissemination tools developed under TIA. According to The National Journal, it was renamed "Basketball." The other, Genoa II, used information technologies to help analysts and decision makers anticipate and pre-empt terrorist attacks. It was renamed "Topsail."

Has the NSA been employing those TIA technologies in its surveillance within the United States? And what exactly is the agency doing, anyway?

The hearings that the Senate Judiciary Committee convened in February to consider the NSA's surveillance gave some clues. Attorney General Alberto Gonzales, maintaining the administration's defense against charges that it violated the Fourth Amendment and FISA, told senators, firstly, that Article II of the U.S. Constitution granted a president authority to conduct such monitoring and, secondly, that the Authorization to Use Military Force (AUMF) passed after September 11 specified that the president could "use all necessary and appropriate force" to prevent future terrorist acts. Regarding FISA, Gonzalez claimed, the NSA had sidestepped its requirements to obtain warrants for electronic eavesdropping in particular cases. But, overall, the attorney general said, FISA worked well and the authorities had used it increasingly. The available facts support Gonzalez's contention: while the FISA court issued about 500 warrants per year from 1979 through 1995, in 2004 (the last year for which public records exist) 1,758 warrants were issued.


But when senators asked why, given the fact that FISA had provisions by which government agents could wiretap first and seek warrants later, the Bush administration had sidestepped its requirements at all, Gonzalez claimed he couldn't elaborate for reasons of national security.

Former NASA director General Michael Hayden, in charge when the NSA's surveillance program was initiated in 2002, was slightly more forthcoming. FISA wasn't applicable in certain cases, he told the senators, because the NSA's surveillance relied on what he called a "subtly softer trigger" before full-scale eavesdropping began. Hayden, who is nowadays the nation's second-highest ranking intelligence official, as deputy director of national intelligence, said he could answer further questions only in closed session.

… testimony that the government is making increased use of FISA, together with his refusal to explain why it's inapplicable in some cases -- even though retroactive warrants can be issued -- implies that the issue isn't simply that government agents may sometimes want to act quickly. FISA rules demand that
old-fashioned "probable cause" be shown before the FISA court issues warrants for electronic surveillance of a specific individual. Probable cause would be inapplicable if NSA were engaged in the automated analysis and data mining of telephone and e-mail communications in order to target possible terrorism suspects.

… NSA has access to the switches and records of most or all of the nation's leading telecommunications companies. These companies' resources are extensive:

AT&T's data center in Kansas, for instance, contains electronic records of 1.92 trillion telephone calls over several decades.

… the majority of international telecommunications nowadays no longer travel by satellite, but by undersea fiber-optic cables, so many carriers route international calls through their domestic U.S. switches.

With the companies' compliance, the NSA can tap into those international communications far more easily than in the past, and in real time (or close to it). The NSA's supercomputers can digitally vacuum up every call placed on a network and apply an arsenal of data-mining tools.

Traffic analysis, together with social network theory, can, in theory, reveal patterns indiscernible to human analysts, possibly suggesting terrorist activity. Content filtering, applying highly sophisticated search algorithms and powerful statistical methods like Bayesian analysis in tandem with machine learning, can search for particular words or language combinations that may, in theory, indicate terrorist communications.

In practice … they produce massive watch lists and time wasting false alarms.

Whether the specific technologies developed under TIA and acquired by ARDA have actually been used in the NSA's domestic surveillance programs -- rather than only for intelligence gathering overseas -- has not been proved. Descriptions of the two former TIA programs that became Topsail and Basketball mirror descriptions of ARDA and NSA technologies for analyzing vast streams of telephone and e-mail communications. One project manager active in the TIA program before it was terminated has gone on record to the effect that, while TIA was still funded, its researchers communicated regularly and maintained "good coordination" with their ARDA counterparts.

This is the point. Whether or not those specific TIA technologies were deployed for domestic U.S. surveillance, technologies very much like them were. In 2002 ARDA awarded $64 million in research contracts for a new program called Novel Intelligence from Massive Data. A 2004 survey by the U.S. General Accounting Office, an investigative arm of Congress, found federal agencies operating or developing 199 data mining projects, with more than 120 programs designed to collect and analyze large amounts of personal data on individuals to predict their behavior. The accounting office excluded most of the classified projects, so the actual numbers would have been higher.


And, there exist all the data-mining applications currently employed in the private sector for purposes like detecting credit card fraud or predicting health risks for insurance. All of that information goes into databases which, given sufficient government motivation or even the normal mission creep, may sooner or later be accessible to the authorities.

How should data-mining technologies like TIA be applied in a democracy? It makes little sense to insist on rigid interpretations of the FISA law was passed by Congress 30 years ago. Terrorist threats on al Qaeda's scale did not exist and technological developments hadn't given unprecedented destructive power to small groups and individuals.…

In an essay published next month in the New York University Review of Law and Security, titled "Whispering Wires and Warrantless Wiretaps: Data Mining and Foreign Intelligence Surveillance," K. Taipale, executive director of the Center for Advanced Studies in Science and Technology Policy, points out that in 1978, when FISA was drafted, it made sense to speak exclusively about intercepting a targeted communication, where there were usually two known ends and a dedicated communication channel that could be wiretapped.

Today data, and increasingly voice communications, are broken into discrete packets. Intercepting such communications requires that filters be deployed at various communication nodes to scan all passing traffic with the hope of finding and extracting the packets of interest and reassembling them. Even targeting a specific message from a known sender today generally requires scanning and filtering the entire communication flow in which it's embedded. Given that situation, Taipale argues, were FISA to be "applied strictly according to its terms prior to any 'electronic surveillance' of foreign communication flows passing through the U.S. or where there is a substantial likelihood of intercepting U.S. persons, then no automated monitoring of any kind could occur."

Taipale, but not the Bush administration, proposes not that FISA should be modified to allow for the electronic surveillance equivalent of a Terry stop -- under U.S. law, the brief "stop and frisk" of a person by a law enforcement officer based on the legal standard of reasonable suspicion. In the context of automated data mining, it would mean that if suspicion turned out to be unjustified, after further monitoring, it would be discontinued. If, on the other hand, continued suspicion was reasonable, then it would continue, and at a certain point be escalated so that human agents would be called in to decide whether a suspicious individual's identity should be determined and a FISA warrant issued.

Of course, that turns the Bill of Rights on its head.

To attempt to maintain FISA and the rest of our current laws about privacy without modifications to address today's changed technological context, Taipale insists, amounts to a kind of absolutism that is ultimately self-defeating. For example, one of the technologies in the original TIA project, the Genisys Privacy Protection program, was intended to enable greater access to data for security reasons while simultaneously protecting individuals' privacy by providing critical data to analysts via anonymized transaction data and by exposing identity only if evidence and appropriate authorization was obtained for further investigation. Ironically, Genisys was the one technology that definitely had its funding terminated and was not continued by another government agency after the public outcry over TIA.

Home page image is available under GNU Free Documentation License 1.2. Caption: Original logo of the now-defunct Total Information Awareness Office, which drew much criticism for its "spooky" images.

Wednesday, May 24, 2006

Joe Galloway is Retiring

Joe Galloway, Nearing Retirement, Hits Rumsfeld in E-mails

A series of combative and revealing emails between Galloway and chief Pentagon spokesman Larry DiRita concerning Donald Rumsfeld’s management of the military and the Iraq war have surfaced which cut to the heart of the country’s current trauma. Retired General Barry McCaffery, a familiar figure nowadays as a cable news commentator, urged Galloway to release the emails, calling them “the most powerful stuff hands down I have ever read about this war. ...this exchange ought to be your going away gift to the capital.”

It all began on April 26, with a typically toughminded Galloway column. It profiled retired Marine Lt. Gen. Paul Van Riper, who commanded both the Marine War College at Quantico, Va., and the National War College in Washington before retiring in 1997. Galloway recalled that Van Riper had told an interviewer in October 2004 that the military got the lessons all wrong after World War II and that mistake resulted in two disasters -- Korea and Vietnam.

"My great fear is we're off to something very similar to what happened after World War II, that is getting it completely wrong again," Van Riper said of Iraq. But Van Riper saved his strongest criticism for the Pentagon boss. "Mr. Rumsfeld has failed 360 degrees in the job. He is incompetent," Van Riper concluded. "Any military man who made the mistakes he has made, tactically and strategically, would be relieved on the spot."

Two days later, Rumsfeld's top spokesman, DiRita, fired off a reply to his friend Galloway (original spelling and typography retained in all emails that follow): “Let's at least be honest about this: there is a lot of change taking place, and that change forces people to re-examine the way we have always done things,” he wrote. “That is bumpy, and that can make people anxious. ... Van Riper has never even met the secretary to my knowledge. For him to make such sweeping comments as he did in your piece is just irresponsible.

“You're just becoming a johnny one-note and it's only a couple of steps from that to curmudgeon!!”

-- Galloway replied in an email: “i've always understood that the guy in charge takes the fall for everything that goes wrong on his watch. this is why the u.s. navy courtmartials the captain of any ship that is involved in an accident or is sunk for whatever reason….Last I knew Mr. Rumsfeld was the Secretary of Defense. He has the ultimate responsibility….”

"there are many things we all could wish had happened. i can wish that your boss had surrounded himself with close advisers who had, once at least, held a dying boy in their arms and watched the life run out of his eyes while they lied to him and told him, over and over, ‘You are going to be all right. Hang on! Help is coming. Don't quit now...’ Such men in place of those who had never known service or combat or the true cost of war, and who pays that price, and had never sent their children off to do that hard and unending duty.

“i could wish for so much. i could wish that in january of this year i had not stood in a garbage-strewn pit, in deep mud, and watched soldiers tear apart the wreckage of a kiowa warrior shot down just minutes before and tenderly remove the barely alive body of WO Kyle Jackson and the lifeless body of his fellow pilot. they died flying overhead cover for a little three-vehicle Stryker patrol with which i was riding at the time. i could wish that Jackson's widow Betsy had not found, among the possessions of her late husband, a copy of my book, carefully earmarked at a chapter titled Brave Aviators, which Kyle was reading at the time of his death. That she had not enclosed a photo of her husband, herself and a 3 year old baby girl.

“those things i received in the mail yesterday and they brought back the tears that i wept standing there in that pit, feeling the same shards in my heart that i felt the first time i looked into the face of a fallen american soldier 41 years ago on a barren hill in Quang Ngai Province in another time, another war. someone once asked me if i had learned anything from going to war so many times. my reply: yes, i learned how to cry.”

“you can sit there all day telling me that pigs can fly, with or without lipstick, and i am not going to believe it. seemingly the reverse is also true. one of us is dead wrong and i have a good hunch that it would be you. you go flying blind through that forest and you are going to find those trees for sure.

There's a video of an ambush in the Washington Post, raw video of an attack on a convoy that Post Reporter Nelson Hernandez was traveling with in Iraq. The convoy had just delivered new water trucks to the water agency in Baghdad when they came under attack by insurgents. They were ambushed after they had made their delivery.

Ambushed at the point of successful delivery!

At the very place where, finally, they should have been safe!

They're celebrating again at the White House. The Taliban is back in southern Afghanistan, Bin Laden's still free, the insurgents are stronger in Iraq, but, American journalists hardly ever leave the Green Zone. Fewer and fewer, of these pictures will be taken. Fewer of those will make the evening news. For an administration in love with secrecy that's probably reason enough to celebrate.

Monday, May 01, 2006

When Did We Stop Believing (In Opportunity)?

Why did we stop?

“…among the top tier of private liberal-arts institutions, application rates have grown by one-third or more during the last five years alone. Meanwhile, the available spaces have remained the same and the number of high school seniors, the baby boomers' baby boom, has hit its peak.

Beneath all the statistics lies a widely heeded yet thoroughly unexamined truism — that the student who does not get into Stanford or Yale, or at least Emory or Skidmore, will lose out in the contest for the supposedly finite amount of opportunity in America.”

Not so long ago even those totally locked out of the American Dream believed the opportunities were real and abundant. A dreamer dared dream that ‘one day’ his ‘little children’ would ‘be judged not by the color of their skin but the content of their character.’

That dream has not only eluded our grasp, but seems about to escape the American imagination. No one out of power or in believes there's a slice of the pie for everyone. Those with the resources or power to apportion, make sure they get their piece.

So NASA had to redirect half of its planned education spending, 5 percent of its exploration systems budget and 4 percent of its science budget to Congressional vanity. The Department of Homeland Security, as part of the budget law passed last year, was ordered to hire the American Association of Airport Executives, an aviation trade group, to process applications for a new tamper-proof identification card for maritime workers.

…judging from revelations that hordes of greedy senators and representatives have siphoned more than half a billion dollars from NASA's budget for the 2006 fiscal year to finance pet projects

Documents have circulated in Washington showing that the association, before the budget bill became law, was offering prospective investors a role in future contracts in exchange for an investment totaling up to $25 million. While the prospectus mentioned the identity card contract, it made no reference to the legislation.

The money would be used to set up a for-profit company that the group would hire as a subcontractor to handle the soon-to-be promised government work.

The contracts with Homeland Security would produce $50 million in profits over three years for the new partnership, the business plan projected. Daon, an Irish biometrics company with offices in Reston, Va., ultimately bought 51 percent control of the new entity, said Andrew J. Sherman, a Washington lawyer who helped handle the transaction.

Government records show that the new company, the Security Biometric Clearing Network, was incorporated last month in Delaware. Daon's board includes Tom Ridge, the former Homeland Security secretary, and the company has already sold its software to the government for some of these same programs.

…One thing is obvious, these people have their thumbs on the scale, and they're making sure some people get to skim the cash register while promising the rest of us a day's wages for a week's work.

It's easy to believe they're monsters, but the deviation in their moral compass is caused by the their deep belief that there's not enough of anything to go around. Somebody's going to do without, and it's not going to be them or theirs.

In 1968 they slew the dreamer. Since Inauguration day in 2001, they've been killing the dream. Budget cut, tax cut, you don't have to slice an artery or reach a vital organ, if you nick enough veins.…

Friday, April 07, 2006

Hurricane Relief From Abroad Was Mishandled

“WASHINGTON, April 6 — Confusion over how to handle the emergency supplies, offers of military assistance and $126 million in cash that poured in from foreign governments after Hurricane Katrina meant delays, and in some cases wasted opportunities, in aiding storm victims, federal officials acknowledged Thursday.…

Thousands of ready-to-eat meals donated by governments, as well as loads of medicine, were never used, because officials learned only after they arrived in the United States that they did not meet federal health standards. Instead of distributing the supplies, the federal government spent $60,000 to store them.

Of the $126 million in cash donations received, only about $10.5 million has been spent. Nearly half sat in a noninterest-bearing account until last month, when it was transferred to the Department of Education for a grant program to help damaged schools and colleges, although no grants have yet been awarded.…

The cash donations and emergency supplies — including food, clothing, blankets, tents and medicine — came in from nations, companies, individuals and organizations from around the globe. The single biggest source, representing three-quarters of the total cash received, was the United Arab Emirates, which contributed $100 million, according to the State Department.

The United States, at least in modern times, had never received such a large outpouring of foreign aid and no formal process existed to evaluate the offers, officials from the State Department and FEMA testified Thursday.

The Defense Department designated an Air Force base in Arkansas to receive deliveries from overseas and then the Agency for International Development, a State Department agency that usually handles foreign aid, was asked to work with FEMA on distribution.

Casey Long, acting director of the Office of International Affairs at FEMA, testified that 143 truckloads of international donations had ultimately been sent to distribution centers in Louisiana, Alabama and Mississippi, Texas and Arkansas.

But Davi M. D'Agostino, an investigator from the Government Accountability Office, said FEMA could not provide documentation that the goods ever reached hurricane victims or emergency workers.…”

This should be comment enough.

This should be evidence enough.

There is nothing this current administration won't misrepresent. There is nothing they don't have to misrepresent, because there is nothing they've done competently, and nothing they've done right.

Their claim is that they, unlike their opponents have a plan, but an agenda is not a plan. Plans have stages. Plans have timelines. Plans have requirements. Plans change when goals are unmet. When resources change, plans change. They change nature and scope as the situations theyaddress change.

This administration has never had a plan, could never tolerate a plan. So there never has nor will there ever be a plan.

Not for Katrina.

Not for Iraq or Afghanistan.

Not for today, yesterday or tomorrow.

But, boy do they have an agenda. One size fits them.

They don't have a problem, so you have no business seeing any.

How do you like the President's same old new clothes?…


http://www.nytimes.com/2006/04/07/us/nationalspecial/07katrina.html

Sunday, April 02, 2006

The Economics of Hardly Finding Work - Hyphenated Americans Need Not Apply

Immigrants and the Economics of Hard Work - New York Times :

“IT is asserted both as fact and as argument: the United States needs a constant flow of immigrants to perform jobs Americans will not stoop to do.

But what if those jobs paid $50 an hour, with benefits, instead of $7 or $10 or $15?

"Of course there are jobs that few Americans will take because the wages and working conditions have been so degraded by employers," said Jared Bernstein, of the liberal Economic Policy Institute. "But there is nothing about landscaping, food processing, meat cutting or construction that would preclude someone from doing these jobs on the basis of their nativity. Nothing would keep anyone, immigrant or native born, from doing them if they paid better, if they had health care."

The most comprehensive recent study of immigrant workers comes from the Center for Immigration Studies, a group that, unlike Mr. Bernstein's, advocates stricter controls on immigration. The study, by the center's research director, Steven A. Camarota, found that immigrants are a majority of workers in only 4 of 473 job classifications — stucco masons, tailors, produce sorters and beauty salon workers. But even in those four job categories, native-born workers account for more than 40 percent of the work force.

While it might be a challenge to find an American-born cab driver in New York or parking lot attendant in Phoenix or grape cutter in the San Joaquin Valley of California, according to Mr. Camarota's study of census data from 2000-2005, 59 percent of cab drivers in the United States are native born, as are 66 percent of all valet parkers. Half of all workers in agriculture were born in this country.

"The idea that there are jobs that Americans won't do is economic gibberish," Mr. Camarota said. "All the big occupations that immigrants are in — construction, janitorial, even agriculture — are overwhelmingly done by native Americans."

But where they compete for jobs, he said, the immigrants have driven up the jobless rate for some Americans. According to his study, published in March, unemployment among the native born with less than a high school education was 14.3 percent in 2005; the figure for the immigrant population was 7.4 percent.

… George J. Borjas, a professor of economics and social policy at the Kennedy School of Government at Harvard University, said he believed that the flow of migrants had significantly depressed wages for Americans in virtually all job categories and income levels. His study found that the average annual wage loss for all American male workers from 1980 to 2000 was $1,200, or 4 percent, and nearly twice that, in percentage terms, for those without a high school diploma. The impact was also disproportionately high on African-Americans and Hispanic-Americans, Professor Borjas found.

"What this is, is a huge redistribution of wealth away from workers who compete with immigrants to those who employ them," he said. …”

I 'm really tired of hearing about jobs Americans won't take. I've heard that lie all my life, usually with a racial agenda.

I've seen people stand in line for days in sub-zero (farenheit) weather for housecleaning jobs at a hotel that hadn't been built. I know people who work two and three jobs with no benefits. I know people who've never had a steady job, who have, nonetheless, never stopped looking.

The jobs just aren't open to people who look like them… In Chicago, the city where I live, it's all too common to see major street repair and highway projects run through the center of the African American community with every ehtnic group except African Americans represented.

It's no accident, statistical fluke or coincidence. Without constant pressure from government the contractors are actively not looking for African Americans. They moved out of the city to make it more difficult for them to apply for work. Their unions moved their training facilities out of the city's educational system when they were required to integrate them. It was and remains easier for an illegal to enter the construction trades here than a Black citizen of the United States.

That isn't the fault of immigrants, but many of the opportunities they take advantage of are there because African Americans and others fought for them, went to jail for them, even died for them.

The problem is the ‘sucking sound’ Ross Perot warned about is only heard in isolated, segregated, desolated parts of our cities.

http://www.nytimes.com/2006/04/02/weekinreview/02broder.html?pagewanted=all

Friday, March 31, 2006

Woe Unto Them Who Make a Pretense To Devour Widows Houses

Shocks Seen in New Math for Pensions
By MARY WILLIAMS WALSH
A proposed new method of reporting pension obligations is likely to show that many companies have a lot more debt than was obvious before.

“The board that writes accounting rules for American business is proposing a new method of reporting pension obligations that is likely to show that many companies have a lot more debt than was obvious before.

In some cases, particularly at old industrial companies like automakers, the newly disclosed obligations are likely to be so large that they will wipe out the net worth of the company.

The panel, the Financial Accounting Standards Board, said the new method, which it plans to issue today for public comment, would address a widespread complaint about the current pension accounting method: that it exposes shareholders and employees to billions of dollars in risks that they cannot easily see or evaluate. The new accounting rule would also apply to retirees' health plans and other benefits.

A member of the accounting board, George Batavick, said, "We took on this project because the current accounting standards just don't provide complete information about these obligations."

The board is moving ahead with the proposed pension changes even as Congress remains bogged down on much broader revisions of the law that governs company pension plans. In fact, Representative John A. Boehner, Republican of Ohio and the new House majority leader, who has been a driving force behind pension changes in Congress, said yesterday that he saw little chance of a finished bill before a deadline for corporate pension contributions in mid-April.

Congress is trying to tighten the rules that govern how much money companies are to set aside in advance to pay for benefits. The accounting board is working with a different set of rules that govern what companies tell investors about their retirement plans.

The new method proposed by the accounting board would require companies to take certain pension values they now report deep in the footnotes of their financial statements and move the information onto their balance sheets — where all their assets and liabilities are reflected. The pension values that now appear on corporate balance sheets are almost universally derided as of little use in understanding the status of a company's retirement plan. ”

A Benefit for Insurers
By MILT FREUDENHEIM
Critics who say the insurance industry got too big a role in the new Medicare drug program may not know the half of it.

“While the stand-alone Part D drug plans are expected to give insurers a small profit, the margins are likely to be thin — 1 percent to 3 percent before taxes, Humana estimates. That is partly because Humana is offering low premiums and co-payments to attract customers. And the federal subsidy for each customer in a stand-alone Medicare drug plan is only about $75 a month.

But for providing a full Medicare Advantage health policy to a patient, the government pays the insurer $900 to $2,000 a month beyond whatever premium, if any, the patient pays. With that revenue, come bigger profit margins — 3 percent to 5 percent, according to James H. Bloem, Humana's chief financial officer.

For UnitedHealth, the Part D drug business by itself would not be particularly lucrative, adding only 5 to 7 cents to earnings a share, according to Jason Nogueira, an analyst who tracks health care companies for the investment firm T. Rowe Price. That would be no more than 2 cents on the sales dollar for UnitedHealth, which had $45 billion in 2005 revenue and expects profit of $2.90 a share this year.

So the real financial opportunities lie in upgrading Part D enrollees to other Medicare-linked policies. In essence, the high federal subsidies for Medicare Advantage policies are the government's reward to insurers for taking people out of traditional, federally supervised Medicare and into the commercial world of managed care. In fact, Medicare now pays private insurers 15 percent more, on average, to take a patient than it spends in a traditional government program for each patient.

Critics of Medicare's approach, including a number of senior Democrats in Congress, have asked the Congressional Budget Office to examine the issue. The budget office estimated that Medicare could save more than $40 billion over the next 10 years if subsidies to insurers were scaled back to the levels the program now pays directly to doctors and hospitals.

Representative Pete Stark of California, the senior Democrat on the Ways and Means Committee, said in an interview that insurance agents "are out trying to promote seniors into Medicare Advantage plans, and switch them out of plans they are in."

The Medicare law that created the Part D program, Mr. Stark said, "was written by insurance company lobbyists with the help of pharmaceutical company lobbyists."

In a telephone interview, Michael O. Leavitt, the secretary of health and human services, defended the administration's market-based approach to Medicare, saying that market forces were pushing prices lower and that any kinks in Part D would be worked out.

"The market will become simplified because consumers want that," Mr. Leavitt said.

As long as the incentive of federal subsidies stays at current levels, insurers have every reason to pursue them, especially as the industry struggles with slowing growth in its traditional core business of managing employer-sponsored health benefits.

Charles Boorady, a health care securities analyst at Citigroup, said that by expanding Medicare-subsidized offerings, the insurance industry had a potential revenue opportunity of more than $450 billion a year "or enough to almost double the revenue of the managed care industry." ”

1 Then Jesus spoke to the crowds and to His disciples:
2 “The scribes and the Pharisees are seated in the chair of Moses.[1] Perhaps a special chair for teaching in synagogues, or a metaphorical phrase for teaching with Moses’ authority
3 Therefore do whatever they tell you and observe [it]* The bracketed text has been added for clarity. . But don’t do what they do,[2] Lit do according to their works because they don’t practice what they teach.
4 They tie up heavy loads that are hard to carry[3] Other mss omit that are hard to carry and put them on people’s shoulders, but they themselves aren’t willing to lift a finger[4] Lit lift with their finger to move them.
5 They do everything[5] Lit do all their works to be observed by others: They enlarge their phylacteries[6] Small leather boxes containing OT texts, worn by Jews on their arms and foreheads and lengthen their tassels.[7] Other mss add on their robes
6 They love the place of honor at banquets, the front seats in the synagogues,
7 greetings in the marketplaces, and to be called ‘ Rabbi’ by people.

8 “But as for you, do not be called ‘Rabbi,’ because you have one Teacher,[8] Other mss add the Messiah and you are all brothers.
9 Do not call anyone on earth your father, because you have one Father, who is in heaven.
10 And do not be called masters either, because you have one Master,[9] Or Teacher the Messiah.
11 The greatest among you will be your servant.
12 Whoever exalts himself will be humbled, and whoever humbles himself will be exalted.

13 “But woe to you, scribes and Pharisees, hypocrites! You lock up the kingdom of heaven from people. For you don’t go in, and you don’t allow those entering to go in. [
14 “Woe to you, scribes and Pharisees, hypocrites! You devour widows’ houses and make long prayers just for show.[10] Or prayers with false motivation This is why you will receive a harsher punishment.][11]

I guess the market is supposed to solve these problems too, but will it solve our problems or business' problems?

Tuesday, March 28, 2006

Iraqi Documents Are Put on Web, and Search Is On - New York Times

Iraqi Documents Are Put on Web, and Search Is On - New York Times

"There's no quality control," said Michael Scheuer, a former Central Intelligence Agency specialist on terrorism. "You'll have guys out there with a smattering of Arabic drawing all kinds of crazy conclusions. Rush Limbaugh will cherry-pick from the right, and Al Franken will cherry-pick from the left."

American intelligence agencies and presidential commissions long ago concluded that Saddam Hussein had no unconventional weapons and no substantive ties to Al Qaeda before the 2003 invasion.

But now, an unusual experiment in public access is giving anyone with a computer a chance to play intelligence analyst and second-guess the government.

Under pressure from Congressional Republicans, the director of national intelligence has begun a yearlong process of posting on the Web 48,000 boxes of Arabic-language Iraqi documents captured by American troops.

Less than two weeks into the project, and with only 600 out of possibly a million documents and video and audio files posted, some conservative bloggers are already asserting that the material undermines the official view.

On his blog last week, Ray Robison, a former Army officer from Alabama, quoted a document reporting a supposed scheme to put anthrax into American leaflets dropped in Iraq and declared: "Saddam's W.M.D. and terrorist connections all proven in one document!!!"

Not so, American intelligence officials say. "Our view is there's nothing in here that changes what we know today," said a senior intelligence official, who would discuss the program only on condition of anonymity because the director of national intelligence, John D. Negroponte, directed his staff to avoid public debates over the documents. "There is no smoking gun on W.M.D., Al Qaeda, those kinds of issues."

All the documents, which are available on fmso.leavenworth.army.mil/products-docex.htm, have received at least a quick review by Arabic linguists and do not alter the government's official stance, officials say. On some tapes already released, in fact, Mr. Hussein expressed frustration that he did not have unconventional weapons.

Intelligence officials had serious concerns about turning loose an army of amateurs on a warehouse full of raw documents that include hearsay, disinformation and forgery. Mr. Negroponte's office attached a disclaimer to the documents, only a few of which have been translated into English, saying the government did not vouch for their authenticity.

Another administration official described the political logic: "If anyone in the intelligence community thought there was valid information in those documents that supported either of those questions — W.M.D. or Al Qaeda — they would have shouted them from the rooftops."


http://www.nytimes.com/2006/03/28/politics/28intel.html

Sunday, March 26, 2006

Another Problem Markets Can't Solve!

Retraining Laid-Off Workers, but for What? - New York Times:

Layoffs have disrupted the lives of millions of Americans over the last 25 years. The cure that these displaced workers are offered — retraining and more education — is heralded as a sure path to new and better-paying careers. But often that policy prescription does not work, as this book excerpt explains. It is adapted from "The Disposable American: Layoffs and Their Consequences" by Louis Uchitelle, an economics writer for The New York Times. Knopf will publish the book on Tuesday.

“They were, in nearly every case, family men in their 30's and 40's who had worked for United Airlines since the mid-1990's. Summoned by their union, they had gathered in the carpeted conference room at the Days Inn next to Indianapolis International Airport, not far from United's giant maintenance center, a building so big that 12 airliners could be overhauled in it simultaneously. That no longer happened. Most of the repair bays were empty. The airline was cutting back operations, and the 60 mechanics at the meeting were in the fourth group to be let go.

Confrontation had brought on the layoffs. Influenced by militants in their union local, Hoosier Air Transport Lodge 2294 of the International Association of Machinists, the 2,000 mechanics at the center had engaged in a work slowdown for many months, and then a refusal to work overtime. But rather than give ground, United responded by outsourcing, sending planes to nonunion contractors elsewhere in the country.

That scared the mechanics. They quieted down and, in effect, authorized the leaders of Lodge 2294 to make peace. Their hope was that if they cooperated, United would ease up on the layoffs and revive operations at, arguably, one of the most efficient, high-tech maintenance centers in the world. In this state of mind, the union was helping to usher the 60 laid-off mechanics quietly away. It had rented the conference room on this cold January evening in 2003 to introduce the men to what amounted to a boot camp for recycling laid-off workers back into new, usually lower-paying lines of work.

SIMILAR federally subsidized boot camps, organized by state and local governments, often in league with unions, have proliferated in the United States since the 1980's, and now many cities have them. Unable to stop layoffs, government has taken on the task of refitting discarded workers for "alternate careers." In deciding as a nation to try to rejuvenate them as workers, we put in place a system, however unrealistic, that implicitly acknowledged layoffs as a legitimate practice.

The presumption — promoted by economists, educators, business executives and nearly all of the nation's political leaders, Democrats and Republicans alike — holds that in America's vibrant and flexible economy there is work, at good pay, for the educated and skilled. The unemployed need only to get themselves educated and skilled and the work will materialize. Education and training create the jobs, according to this way of thinking. Or, put another way, an appropriate job at decent pay materializes for every trained or educated worker.

If the workers were already trained, as the mechanics certainly were, then what they needed was additional training and counseling as a transition into well-paying, unfilled jobs in other industries.

If the transition failed to function as advertised, well, the accepted wisdom suggested that it was the fault of the workers themselves. Their failure to land good jobs was due to personality defects or a resistance to acquiring new skills or a reluctance to move where the good jobs were.

That was the myth. It evaporated in practice for the aircraft mechanics, whose hourly pay ranged up to $31. Not enough job openings exist at $31 an hour — or at $16 an hour, for that matter — to meet the demand for them. Jobs don't just materialize at cost-conscious companies to absorb all the qualified people who want them.

You cannot be an engineer or an accountant without a degree; in that sense, education and training certainly do count. Furthermore, in the competition for the jobs that exist, the educated and trained have an edge. That advantage shows up regularly in wage comparisons. But you cannot earn an engineer's or an accountant's typical pay if companies are not hiring engineers and accountants, or are hiring relatively few and can control the wage, chipping away at it.

For the mechanics at the Days Inn, the retraining process would begin in a few days with workshops in résumé writing and interviewing skills, personality evaluations and job counseling — and, for a lucky few, tuition grants to go back to school. The mechanics were being "counseled out" of their well-paying trade… ”

The real myth, the one that's killing our hopes and dreams, is the myth that markets, and that's markets alone, solve all economic problems and every social problem with a major economic component.

The invisible hand of the market has been credited for the subtitles under the ‘American Dream,’ before that dream had a name, before there was an America to dream about.

When we wrote our constitution we left the words slave and slavery out, counted on the market to solve the problems of all those other persons it terated as three fifths of a person for purposes of representation.

Nearly a century after our civil war we were still waiting for the market to solve segregation. We're still waiting for the market to enable Pulitzer prize winner Clarence Page to have the certainty of being able to catch a taxicab near the Chicago Tribune's headquarters in downtown Chicago.

Markets failed to enable auto workers the ability to afford the cars they made. Nor did markets solve the post World War Two housing shortage, create the suburbs as we know them, or guarantee their racial composition.

They won't solve their racial problems either. Not anymore than markets get black people test drives at auto dealerships.

Deliberate systematic government actions created all white suburbs in the forties and fifties. Policy and politics created the inner city ghettoes. Banking regulations made most urban blight inevitable, simply by failing to mandate equal access to loans for people in equal financial circumstances.

Peoples livelihoods are threatened by National policies far more than global markets, because there are no truly free markets. There are certainly no markets where everyone is regulated by the same rules.!


http://www.nytimes.com/2006/03/26/business/yourmoney/26lou.html?pagewanted=all

Saturday, March 25, 2006

No Surprises Here

Our conceit is that we’re the world’s sole superpower

But Katrina shows us treating our own citizens in the same ways as third world despots.


We act or fail to act based on class, caste, ethnicity, creed and race.



So is it any wonder that we don’t even count Iraqi casualties?

In the official American world view they don’t count at all.



From http://www.daytondailynews.com/search/content/shared/news/stories/1002courtmartial.html:

The Bush administration bungled the Iraq occupation, arrogantly throwing away State Department occupation plans and C.I.A. insurgency warnings. But the human toll of those mistakes has not been as viscerally evident because the White House pulled a curtain over the bodies: the president has avoided the funerals of soldiers, and the Pentagon has censored the coffins of the dead coming home and never acknowledges the number of Iraqi civilians killed.
American soldiers are immune from the laws of Iraq, so al-Hillali sought justice from the American military, which charged the soldiers with two counts each of armed robbery and discharging a firearm. Although Army officials found some of the missing items in the soldiers' possession and they admitted to robbing houses under the guise of looking for illegal weapons, the Army dismissed the charges. In exchange, Barron said, both soldiers agreed to leave the military.

Using previously undisclosed Army records, the Dayton Daily News found that dozens of soldiers have been accused of crimes against Iraqis since the first troops deployed for Iraq. But despite strong evidence and convictions in some cases, only a small percentage resulted in punishments nearing those routinely imposed for such crimes by civilian justice systems.

In a number of other cases, there was no evidence that thorough or timely criminal investigations were conducted. Other cases weren't prosecuted, and still others resulted in dismissals, light jail sentences or no jail sentence at all.

In several cases, crimes involving military property and violations of military rules such as drinking or adultery — many not crimes at all under civilian law — were treated more harshly than cases involving killing, robbing or kidnapping Iraqi civilians.

"I've been surprised at some of the lenient sentences," said Gary D. Solis, a former military judge and prosecutor who teaches military law at the U.S. Military Academy at West Point. "I have an uneasy suspicion that it relates to the nationality of the victim."

Criminal acts by soldiers — and the lack of punishment — add to the hatred that is fueling the insurgency in Iraq, putting soldiers at greater risk, Solis and other experts said.

"There's been a decline for the respect for the rule of international law and a failure to understand that we, the United States, have to be the good guys," Solis said. "Misconduct only breeds contempt for those who engage in the misconduct, and if we do what we accuse them of doing, then we are in a losing position."

A Daily News analysis of records from the Army Court-Martial Management Information System database found that 226 soldiers were charged with offenses between the first deployments and Jan. 1, 2005. Of the 1,038 separate charges, fewer than one in 10 involved crimes against Iraqis. Virtually all of the rest, more than 900 charges, involved crimes against other soldiers, property, drug or alcohol offenses and violations of military rules.

Charges involving Iraqi victims were three times more likely to be dismissed or withdrawn by the Army than cases in which the victims were soldiers or civilian military employees, the examination found.

Are you disturbed by our total disregard for Iraq's innocent dead, whether killed by the ‘insurgents’ or killed by us?

Do you believe Iran is more of a threat to us than North Korea?

North Korea has long range missiles and nuclear weapons, but we negotiate with them multilaterally and bilaterally.

So, is it OK to threaten muslims?

Sunday, March 19, 2006

This Essay Breaks the Law - New York Times

This Essay Breaks the Law - New York Times

“By MICHAEL CRICHTON
Published: March 19, 2006

• The Earth revolves around the Sun.

• The speed of light is a constant.

• Apples fall to earth because of gravity.

• Elevated blood sugar is linked to diabetes.

• Elevated uric acid is linked to gout.

• Elevated homocysteine is linked to heart disease.

• Elevated homocysteine is linked to B-12 deficiency, so doctors should test homocysteine levels to see whether the patient needs vitamins.

ACTUALLY, I can't make that last statement. A corporation has patented that fact, and demands a royalty for its use. Anyone who makes the fact public and encourages doctors to test for the condition and treat it can be sued for royalty fees. Any doctor who reads a patient's test results and even thinks of vitamin deficiency infringes the patent. A federal circuit court held that mere thinking violates the patent.

All this may sound absurd, but it is the heart of a case that will be argued before the Supreme Court on Tuesday. In 1986 researchers filed a patent application for a method of testing the levels of homocysteine, an amino acid, in the blood. They went one step further and asked for a patent on the basic biological relationship between homocysteine and vitamin deficiency. A patent was granted that covered both the test and the scientific fact. Eventually, a company called Metabolite took over the license for the patent.

Although Metabolite does not have a monopoly on test methods — other companies make homocysteine tests, too — they assert licensing rights on the correlation of elevated homocysteine with vitamin deficiency. A company called LabCorp used a different test but published an article mentioning the patented fact. Metabolite sued on a number of grounds, and has won in court so far.

But what the Supreme Court will focus on is the nature of the claimed correlation. On the one hand, courts have repeatedly held that basic bodily processes and "products of nature" are not patentable. That's why no one owns gravity, or the speed of light. But at the same time, courts have granted so-called correlation patents for many years. Powerful forces are arrayed on both sides of the issue.

In addition, there is the rather bizarre question of whether simply thinking about a patented fact infringes the patent. The idea smacks of thought control, to say nothing of unenforceability. It seems like something out of a novel by Philip K. Dick — or Kafka. But it highlights the uncomfortable truth that the Patent Office and the courts have in recent decades ruled themselves into a corner from which they must somehow extricate themselves.

For example, the human genome exists in every one of us, and is therefore our shared heritage and an undoubted fact of nature. Nevertheless 20 percent of the genome is now privately owned. The gene for diabetes is owned, and its owner has something to say about any research you do, and what it will cost you. The entire genome of the hepatitis C virus is owned by a biotech company. Royalty costs now influence the direction of research in basic diseases, and often even the testing for diseases. Such barriers to medical testing and research are not in the public interest. Do you want to be told by your doctor, "Oh, nobody studies your disease any more because the owner of the gene/enzyme/correlation has made it too expensive to do research?"

The question of whether basic truths of nature can be owned ought not to be confused with concerns about how we pay for biotech development, whether we will have drugs in the future, and so on. If you invent a new test, you may patent it and sell it for as much as you can, if that's your goal. Companies can certainly own a test they have invented. But they should not own the disease itself, or the gene that causes the disease, or essential underlying facts about the disease. …”

Pay close attention here. The people who want to own your genes are the people who are promoting what they call the “ownership society.” They aren't trying to create anything new here. they're just trying to recreate what they consider to be the natural order of things. For them, property is the what our society is all about. Property rights trump workers rights, regulation, civil liberties and even public health and safety.

To you and I this appears to trump common sense. To them this is common sense.

Welcome to a world where workers don't own the benefits of their labor, women don't own their own bodies. Where despite the worship of “ownership” homeowners can lose their homes if the government can claim they'll get higher taxes from newer, more politically connected development.

We had a society like this once before. Perhaps you've heard of slavery?

Sunday, February 26, 2006

Hey! We're the Government and Just Here to Help You!

Justice Dept. Rejects Google's Privacy Issues - New York Times:
“Google Inc.'s concerns that a Bush administration demand to examine millions of its users' Internet search requests would violate privacy rights are unwarranted, the Justice Department said Friday in a court filing.

The 18-page brief argued that because the information provided would not identify or be traceable to specific users, privacy rights would not be violated.

The brief was the Justice Department's reply to arguments filed by Google last week. Google has rebuffed the government's demand to review a week of its search requests.

The department believes that the information will help revive an online child protection law that the Supreme Court has blocked. By showing the wide variety of Web sites that people find through search engines, the government hopes to prove that Internet filters are not strong enough to prevent children from viewing pornography and other inappropriate material online. ”

Given the constantly improving capabilities of search engines, information that can't be used to identify individuals today can hardly be guaranteed to remain unidentifiable. In many cases, the information the government seeks may require them to try to identify individuals. So, anyone who claims to know where this will stop is either naive or duplicitous. Individuals are innocent until proven guilty. Governments, despite the years of spin, bear the burden of proof in our system, because government is guilty until proven innocent. Until we change the constitution, even though most people seem conditioned to believe that individuals must prove themselves innocent, the justice department, the executive branch, under our law is presumed to be in the wrong until they prove otherwise. Alfred Ingram

http://www.nytimes.com/2006/02/26/national/26google.html

Sunday, February 19, 2006

From Lawrence Lessig "the fiction zone that DC has become"

Lawrence Lessig:
Broadband is infrastructure — like highways, if not railroads. If you rely upon “markets” alone to provide
infrastructure, you’ll get less of it, and at a higher price. (See, e.g., the United States, today.)

"…when the Internet first reached beyond research facilities to the masses, it did so on regulated lines — telephone lines. Had the telephone companies been free of the “heavy hand” of government regulation, it’s quite clear what they would have done — they would have killed it, just as they did when Paul Baran first proposed the idea in 1964. It was precisely because they were not free to kill it, because the “heavy hand[ed]” regulation required them to act neutrally, that the Internet was able to happen, and then flourish.

So Waltzman’s wrong about the Internet’s past. But he’s certainly right about what a mandated net neutrality requirement would be. It would certainly be a “complete step backward for the Internet” — back to the time when we were world leaders in Internet penetration, and competition kept prices low and services high. Today, in the world where the duopoly increasingly talks about returning us to the world where innovation is as the network owners says, broadband in the US sucks. We are somewhere between 12th and 19th in the world, depending upon whose scale you use. As the Wall Street Journal reported two months ago, broadband in the US is “slow and expensive.” Verizon’s entry-level broadband is $14.95 for 786 kbs. That about $20 per megabit. In FRANCE, for $36/m, you get 20 megabits/s — or about $1.80 per megabit.

How did France get it so good? By following the rules the US passed in 1996, but that telecoms never really followed (and cable companies didn’t have to follow): “strict unbundling.” That’s the same in Japan — fierce competition induced by “heavy handed” regulation producing a faster, cheaper Internet. Now of course, no one is pushing “open access” anymore. Net neutrality is a thin and light substitute for the strategy that has worked in France and Japan. But it is regulation, no doubt.

So while it is true that we have had both:

(a) common carrier like regulation applied to the Internet, and
(b) basically no effective regulation applied to the Internet

and it is true that we have had both:

(c) fast, fierce competition to provide Internet service and
(d) just about the worst broadband service of the developed world

it is not true that we had (c) when we had (b).

We had (c) when we had (a), and we have (d) now that we have (b).

But in the world where the President has the inherent authority to wiretap telephones, who would be surprised if facts didn’t matter much. "

Here are a few other problems markets didn't and don't solve:

Slavery, Health Care, Retirement Security

Nothing will ever stop people from believing that markets solve them.

In America slavery finally required a civil war, which the slaveholders lost. That was followed by a terrorist campaign that the slaveholders won. Followed, nearly a century later by a civil rights struggle that at times has encompassed both civil disobedience and civil insurrection.

As recently as the end of the sixties the US government refused to insure suburban developments that were open to non-whites. Discrimination against minority farmers in Federal Programs continued until the Clinton administration.

Maybe we're wasting our time arguing the pros and cons of reparations for slavery. Maybe we should be talking about reparations from Plessy versus Ferguson to the 1967 voting rights act. Al Ingram

http://www.lessig.org/blog/archives/003290.shtml

Tax Filing Season

Librarians' Internet Index:


Audits ( 5 )Just For Fun ( 7 )
Calculators, Charts, & Tables ( 11 )Opinions & Protest ( 6 )
Disaster Relief ( 3 )Other Federal Tax Resources ( 42 )
E-filing ( 8 )Refunds ( 2 )
Forms & Instructions, State and... ( 11 )State Tax Resources (Primarily Cali... ( 14 )
Fraud & Scams ( 7 )Tax Reform ( 6 )
Free and Low-Cost Filing ( 4 )Volunteer Tax Assistance ( 2 )



If you haven't used Librarians' Internet Index, it's time.

Of course, trustworthy information may take all the fun out of searching for some of us.

http://lii.org/pub/topic/taxes
con·cept