Thursday, January 12, 2012

this is exactly how the french revolution started...,

thenakedcity | Republican Gov. Tom Corbett has announced a major assault on the food stamp program that feeds 1.8 million Pennsylvanians, including 439,245 in Philadelphia. Pennsylvania's Department of Public Welfare announced that on May 1, people under 60 with more than $2,000 in savings or other assets will be barred from receiving food stamps. People over 60 would have a $3,250 cap.

As the Inquirer points out in a detailed look, the move to cut food stamps is way out of line with what other states are doing: Pennsylvania plans to make the amount of food stamps that people receive contingent on the assets they possess — an unexpected move that bucks national trends and places the commonwealth among a minority of states.”

The trend during the Great Recession, with millions falling into poverty, has been to remove such barriers to assistance. Gov. Ed Rendell eliminated the state's asset test in 2008. Pennsylvania now joins 11 states with asset tests — including Indiana, Kansas, Missouri and South Dakota.

Eliminating “waste, fraud and abuse” is an old and recurrent refrain from those who seek to dismantle the country's social welfare system. But it's a cynical ruse: 30 percent of those eligible for food stamps in Pennsylvania don't receive them. According to federal data, the Inquirer notes, Pennsylvania has a fraud rate of just one-tenth of 1 percent.

Conservatives frequently bristle at the idea that poor people might have nice things while receiving public assistance ("they have a television on welfare!"). But Pennsylvania will now create the most bizarre of disincentives: dissuading poor people from saving.

We all know that families need to save money to get off government assistance and achieve self-sufficiency,” according to a press release from Carey Morgan, Executive Director of the Greater Philadelphia Coalition Against Hunger. “So it’s not only inhumane, but counterproductive to force people to drain their savings before they can get any help. Someone with less than $2,000 in the bank would easily be wiped out by one visit to the emergency room.”

The City of Philadelphia has condemned the move, as have local retailers who stand to lose business from food stamp recipients. The food stamp program is a major economic stimulus: every dollar of public funds spent on food stamps grows GDP by $1.73.

There was a time not too long ago when even Republicans seemed to support the food stamp program.

the faustian bargain

ourfiniteworld | Recently, beliefs have shifted again, with people worshipping just one part of a god, the invisible hand. Thanks to Adam Smith and those who followed him, especially the current neoclassical economic theologians, we have seen such an increase in the world’s wealth and sheer numbers that it is hard to imagine life before the industrial revolution, with its shift from mostly human and animal muscle power to the energy dense fossil fuels—coal, oil, and natural gas. It is also hard to imagine that humanity could someday slide back into another age of scarcer and more expensive energy, but that is a possibility that cannot be excluded from our thinking.

What about the Faustian bargain? It remains deeply hidden from view because its exposure by the high priests of modern economics would force us to rethink how we live and why we live this way, as well as what we’re planning to leave for future generations. The Faustian bargain goes something like this: Thanks to the discovery and exploitation of fossil fuels, humans (really just a small minority of them) are able to live richer lives today than even the queens and kings of yore could have dreamed of.

Furthermore, we’ve used some of those finite resources to increase food supplies and to expand the human population, which provides the economic system with both more workers and more consumers, a necessity to keep the economy growing under our current economic model. The world’s population increased from 1.6 billion in 1900 to 7 billion today, and we add about 80 million more each year. Humans have quickly become the most numerous megafauna on the planet.

The other side of the bargain, the side hidden from view and never mentioned in economics texts is this: At some undetermined time in the future, one that creeps ever closer, this economic system, fed by energy and other resources at ever increasing rates at one end and spewing out waste products at rates that cannot be absorbed by Earth’s ecosystems at the other, is unsustainable. What that means is simple enough: Industrial society as we know it cannot go on as it has forever—not even close.

Our economic system must exist within Earth’s finite limits, so recent and current generations have sold their soul to the devil for temporary riches, leaving the Devil to collect his due when the system falls apart under its own weight and the four horsemen of the apocalypse ride again across the world’s landscapes. None of this will happen tomorrow or this week or this year, but our economic system is faltering at both ends.

For many, if not most, of the world’s population life may become more difficult, incomes lower, and uncertainty greater. It does not mean the end of the world, as some predict for 2012, but it will mean that future generations probably will not live like current ones. Rather than admit that the current system cannot be sustained, the affluent and powerful will do everything possible to maintain the status quo.

Wednesday, January 11, 2012

intolerable levels of truthiness...,

the war on iran..,



globalresearch | The Islamic Republic of Iran has been threatened with military action by the US and its allies for the last eight years.

Iran has been involved in war games in the Persian Gulf. The US Navy is deployed. Iran's naval exercises which commenced on December 24th were conducted in an area which is patrolled by the US Fifth Fleet, based in Bahrain.

Meanwhile, a new round of economic sanctions against the Islamic Republic of Iran has been unleashed, largely targeting Iran's Central Bank, leading to a dramatic plunge of Iran's currency.

Reacting to US threats, Iran declared that it would consider blocking the shipment of oil through the Strait of Hormuz:

"Roughly 40 percent of the world's oil tanker shipments transit the strait daily, carrying 15.5 million barrels of Saudi, Iraqi, Iranian, Kuwaiti, Bahraini, Qatari and United Arab Emirates crude oil, leading the United States Energy Information Administration to label the Strait of Hormuz "the world's most important oil chokepoint." (John C.K. Daly, War Imminent in Strait of Hormuz? $200 a Barrel Oil? Global Research, January 3, 2012)

The Globalization of War and the Demise of the American Republic

There is a symbiotic relationship between War and the Economic Crisis.

The planning of the Iran war is being carried out at the crossroads of a worldwide economic depression, which is conducive to widening social inequalities, mass unemployment and the impoverishment of large sectors of the world population.

Crushing social movements on the domestic front --including all forms of resistance to America's military agenda and its neoliberal economic policies-- is an integral part of the United States' hegemonic role Worldwide.

Does Constitutional Government in the eyes of the Obama Administration constitute an encroachment to "The Globalization of War"?

History tells us that an Empire cannot be built on the political foundations of a Republic.

In this regard, it should come as no surprise that the new Iran sanctions regime adopted by the US Congress became law on New Year's Eve, December 31st, on the same day Obama signed into law the National Defense Authorization Act (NDAA 2012), which suspends civil liberties and allows for the "Indefinite Detention of Americans". (See Michel Chossudovsky, The Inauguration of Police State USA 2012. Obama Signs the “National Defense Authorization Act ", Global Research, January 1, 2012)

The Obama administration is intent upon crushing both social dissent as well as antiwar protest. The American Republic is incompatible with America's "long war". What is required is the instatement of a "democratic dictatorship", a de facto military rule in civilian cloths.

Thousands of Troops to Israel

Advanced war preparations are ongoing. Barely mentioned by the Western media, although confirmed by Israeli press reports, the Pentagon is preparing to send several thousand US troops to Israel.

In the context of ongoing war preparations, these troops are slated to participate in joint US-Israeli military maneuvers in Spring 2012, described by the Jerusalem Post as "the largest-ever missile defense exercise in [Israel's] history." (emphasis added)

Last week [11-18 December], Lt.-Gen. Frank Gorenc, commander of the US’s Third Air Force based in Germany, visited Israel to finalize plans for the upcoming drill, expected to see the deployment of several thousand American soldiers in Israel. (US commander visits Israel to finalize missile... Jerusalem Post December 21, 2011 emphasis added)

These war games involve the testing of Israel's air defense system, which is now fully integrated into the US global missile detection system, following the installation (December 2008) of a new sophisticated X-band early warning radar system. (See www.defense.gov/news/, December 30, 2011, .See also Sen. Joseph Azzolina, Protecting Israel from Iran's missiles, Bayshore News, December 26, 2008).

The US global missile detection system includes satellites, Aegis ships in the Mediterranean, Persian Gulf and Red Sea as well as land-based Patriot radars and interceptors. In the context of planning the US-Israel Spring war games:

"The US will also bring its THAAD (Terminal High Altitude Area Defense) and shipbased Aegis ballistic missile defense systems to Israel to simulate the interception of missile salvos against Israel.

The American systems will work in conjunction with Israel’s missile defense systems – the Arrow, Patriot and Iron Dome.

Gorenc came to Israel for talks with Brig.-Gen. Doron Gavish, commander of the Air Force’s Air Defense Division.

He toured one of the Iron Dome batteries in the South and the Israel Test Bed lab in Holon where the IAF holds its interception simulation exercises.

The IAF is planning to deploy a fourth battery of the Iron Dome counter-rocket system in the coming months and is mulling the possibility of stationing it in Haifa to protect oil refineries located there.

The Defense Ministry has allocated a budget to manufacture an additional three Iron Dome batteries by the end of 2012. IAF operational requirements call for the deployment of about a dozen batteries along Israel’s northern and southern borders.

The IAF is also moving forward with plans to deploy Rafael’s David’s Sling missile defense system, which is designed to defend against medium-range rockets and cruise missiles. Rafael recently completed a series of successful navigation and flight tests of the David’s Sling’s interceptor and plans to hold the first interception test by mid-2012. US commander visits Israel to finalize missile... Jerusalem Post December 21, 2011)

you realize it's already begun, right?

Tuesday, January 10, 2012

the streets of 2012

ferrada-noli | What does the New Year hold for the global wave of protest that erupted in 2011? Did the surge of anger that began in Tunisia crest in lower Manhattan, or is 2012 likely to see an escalation of the politics of dissent?

The answers are alarming, but quite predictable: We are likely to see much greater centralization of top-down suppression -- and a rash of laws around the developed and developing world that restrict human rights. But we are also likely to see significant grassroots reaction.

What we are witnessing in the drama of increasingly globalized protest and repression is the subplot that many cheerleaders for neoliberal globalization never addressed: the power of globalized capital to wreak havoc with the authority of democratically elected governments. From the perspective of global corporate interests, closed societies like China are more business-friendly than troublesome democracies, where trade unions, high standards of human-rights protection, and a vigorous press increase costs.

All over the world, the push-back against protest looks similar, suggesting that state and corporate actors are learning "best practices" for repressing dissent while maintaining democratic facades.

In the United Kingdom, Prime Minister David Cameron routinely impugns human-rights laws; the Metropolitan Police have sought authority to use baton rounds -- foot-long projectiles that have caused roughly a dozen deaths, including that of children, in Northern Ireland -- on peaceful protesters; and a police report on the threat of terrorism, distributed to "trusted partners" among London businesses, included updates about Occupy protests and referred to "suspected activists."

The UK has stringent internal-security legislation, but it never had a law like the United States Patriot Act. After anti-austerity protests in early 2011, followed by riots in major cities in August, the Metropolitan Police claimed powers to monitor private social-media accounts and smartphones. And, under the guise of protecting this summer's Olympics against terrorism, the British military is establishing a massive base in London from which SAS (special forces) teams will operate -- a radical departure from Britain's traditional civil policing.

In Israel, Ha'aretz reports that Occupy-type protests have been met with police violence, including a beating of a 15-year-old girl, and threats of random arrest.

Israel, like Britain, has seen a push, seemingly out of nowhere, to enact new laws crippling news gathering and criminalizing dissent: A new law makes it potentially a crime to donate to left-wing organizations, human-rights laws have been weakened, and even investigative reporting has become more dangerous, owing to stricter libel penalties. Ha'aretz calls the push "the new feudalism."

Finally, in the US, the National Defense Authorization Act, enacted by Congress in December, allows the president to suspend due process for US citizens, detain them indefinitely and render them for torture. One should not be surprised to see similar legislation adopted in democracies worldwide.

Not only are laws criminalizing previously legal dissent, organizing, and reporting being replicated in advanced democracies; so are violent tactics against protesters, backed by the increasing push in countries with long traditions of civil policing to militarize law enforcement.

Indeed, increasingly sophisticated weapons systems and protective equipment are being disseminated to civilian police officers. In the US, the federal government has spent an estimated $34bn since the September 11, 2001, terrorist attacks to arm state and local police forces with battlefield-grade hardware. Investigative reporting has also revealed cross-pollination of anti-protest training: Local police from cities like Austin, Texas, have been sent to Israel for training in crowd control and other tactics.

The globalization of mercenaries to crack down on dissent is also proceeding apace. Mercenaries are important in a time of global grassroots protest, because it is easier to turn a foreigner's guns or batons against strangers than it is to turn the military or police against fellow citizens.

Erik Prince, the head of the most infamous outfit, Academi (formerly Xe Services, formerly Blackwater), has relocated to the UAE, while Pakistani mercenaries have been recruited in large numbers to Bahrain, where protesters have been met with increasingly violent repression.

But this apparently coordinated push-back against global protest movements is not yet triumphant -- not even in China, as the people of Wukan have shown. While the outcome of the villagers' protest against the local government's confiscation of their land remains uncertain, the standoff reveals new power at the grassroots level: Social media allows sharper, coordinated gatherings and the rapid dissemination of news unfiltered by official media. The internet is also disseminating templates of what real democracy looks like -- instantly and worldwide.

Not surprisingly, people use this technology in ways that indicate that they have little interest in being cordoned off into conflicting and competing ethnicities, nationalities, or religious identities. Overwhelmingly, they want simple democracy and economic self-determination.

That agenda is in direct conflict with the interests of global capital and governments that have grown accustomed to operating without citizen oversight. It is a conflict that can be expected to heighten dramatically in 2012, as protesters' agendas -- from Occupy Wall Street to Occupy Moscow -- gain further coherence.

Much is at stake. Depending on the outcome, the world will come to look either more like China -- open for business, but closed for dissent -- or more like Denmark.

What other 'disruptively compliant' tools can you think of creating?

Expect a lot more of this. Expect those who use computers to transmit subversive true messages to be labelled terrorists and violently attacked by government authorities. Taking down Occupy Wall St. livefeed operators is just the beginning. This prescient essay, "Waging Peace on the Internet", authored by an Anonymous founder in 2002, describes what's going on pretty well. This essay is the intellectual precursor to recent activities and movements like WikiLeaks and Occupy Wall St. As many of you hopefully know, Anonymous was built by CultoftheDeadCow/Hacktivismo to act as guardian and protector of WikiLeaks. As most of you hopefully also know, Occupy Wall St. was kicked off by Adbusters and Anonynmous, but now has a life of its own.

Hacktivismo | Waging Peace on the Internet by Oxblood Ruffin

There's an international book burning in progress; the surveillance cameras are rolling; and the water canons are drowning freedom of assembly. But it's not occurring anywhere that television can broadcast to the world. It's happening in cyberspace.

Certain countries censor access to information on the Web through DNS (Domain Name Service) filtering. This is a process whereby politically challenging information is blocked by domain address (the name that appears before the dot-com/net/org suffix, as in Tibet.com, etc.). State censors also filter for politically or socially-unacceptable ideas in e-mail. And individual privacy rights and community gatherings are similarly regulated.

China is often identified as the world's worst offender with its National Firewall and arrests for on-line activity. But the idea that the new Mandarins could have pulled this off by themselves is absurd. The Chinese have aggressively targeted the Western software giants, not only as a means of acquiring technical know-how, but also as agents for influencing Western governments to their advantage through well-established corporate networks of political lobbying. Everything is for sale: names, connections, and even national security.

Witnessing hi-tech firms dive into China is like watching the Gadarene swine. Already fat and greedy beyond belief, the Western technology titans are being herded towards the trough. And with their snouts deep in the feedbag, they haven't quite noticed the bacon being trimmed off their ass. It isn't so much a case of technology transfer as digital strip-mining. Advanced research and technical notes are being handed over to the Chinese without question. It couldn't be going better for the Communists. While bootstrapping their economy with the fruits of Western labor and ingenuity, they gain the tools to prune democracy on the vine.

But to focus on Beijing's strategy misses the larger opportunity of treating the spreading sickness that plagues cyberspace. Cuba not only micromanages its citizens' on-line experience, it has recently refused to sell them computers, the US trade embargo notwithstanding. Most countries indulging in censorship claim to be protecting their citizens from pornographic contagion. But the underlying motive is to prevent challenging opinions from spreading and coalescing through the chokehold of state-sponsored control. This includes banning information that ranges from political opinion, religious witness, "foreign" news, academic and scholarly discovery, news of human rights abuses, in short, all the intellectual exchange that an autocratic leadership considers to be destabilizing.

The capriciousness of state-sanctioned censorship is wide-ranging.
  • In Zambia, the government attempted to censor information revealing their plans for constitutional referenda.
  • In Mauritania - as in most countries - owners of cybercaf s are required to supply government intelligence agents with copies of e-mail sent or received at their establishments.
  • Even less draconian governments, like Malaysia, have threatened Web-publishers, whose only crime is to publish frequent Web site updates. Timely and relevant information is seen as a threat.
  • South Korea's national security law forbids South Koreans from any contact - including contact over the Internet - with their North Korean neighbors.
The risks of accessing or disseminating information are often great.
  • In Ukraine, a decapitated body found near the village of Tarachtcha is believed to be that of Georgiy Gongadze, founder and editor of an on-line newspaper critical of the authorities.
  • In August 1998, an eighteen year old Turk, Emre Ersoz, was found guilty of "insulting the national police" in an Internet forum after participating in a demonstration that was violently suppressed by the police. His ISP provided the authorities with his address.
  • Journalist Miroslav Filipovic has the dubious distinction of having been the first journalist accused of spying because his articles detailed the abuses of certain Yugoslav army units in Kosovo, and were published on the Internet.
These are dangerous trends for all of us. The Cult of the Dead Cow (cDc) and Hacktivismo are not prepared to watch the Internet's lights dim simply because liberal democracies are asleep at the switch.

Our fathers and grandfathers fought wars defending, among other things, our right to speak and be heard. They even fought to defend unpopular opinions. It is the unpopular opinions that are most in need of defense. Without them, society would remain unchallenged and unwilling to review core beliefs. It is this tension between received truths and challenging ones that keeps societies healthy and honest. And any attempt at preventing the open exchange of ideas should be seen for what it is: censorship.

For the past four years the cDc has been talking about hacktivism. It's a chic word, beloved among journalists and appropriators alike. Yet the meaning is serious. Our definition of hacktivism is, "using technology to advance human rights through electronic media." Many on-line activists claim to be hacktivists, but their tactics are often at odds with what we consider hacktivism to be. From the cDc's perspective, creation is good; destruction is bad. Hackers should promote the free flow of information, and causing anything to disrupt, prevent, or retard that flow is improper. For instance, cDc does not consider Web defacements or Denial of Service (DoS) attacks to be legitimate hacktivist actions. The former is nothing more than hi-tech vandalism, and the latter, an assault on free speech.

As we begin to challenge state-sponsored censorship of the Internet, we need to get our own house in order. There have to be accepted standards of what constitutes legitimate hacktivism, and what does not. And of course, none of this will be easy. Hacktivism is a very new field of endeavor that doesn't rely on mere technical expedience. We have to find new paradigms. (Tossing the letter E in front of a concept that has meaning in meat-space, to borrow a term from the Electronic Disturbance Theatre, is convenient but rarely meaningful). There is no such thing as electronic civil disobedience. Body mass and large numbers don't count as they do on the street. On the Internet, it's the code that counts, specifically code and programmers with conscience.

We need to start thinking in terms of disruptive compliance rather than civil disobedience if we want to be effective on-line. Disruptive compliance has no meaning outside of cyberspace. Disruptive, of course, refers to disruptive technology, a radically new way of doing things; compliance refers back to the Internet and its original intent of constructive free-flow and openness.

But what disruptively compliant, hacktivist applications shall we write, and more importantly, how shall we write them? There are essentially two ways of writing computer programs: closed/proprietary, and, open/public. In non-technical terms, a closed program would be like a menu item in a restaurant for which there was no recipe. An open program would be like a dish for which every ingredient, proportion, and method of preparation was published. Microsoft is an example of a closed, hi-tech restaurant; Linux is its stellar opposite, an open code cafeteria where all is laid bare. For years the technical community has been raging over the absolutes of closed over open code, an argument only slightly more boring than whether Macs are better than PCs.

The answer to this debate is relative; it leans closer to the user's requirements than to the geek community's biases. If the user wants an inflexible, controlled - and often insecure - experience, then closed is the way to go. But if the user opts for greater variety and freedom from control, then flexible, open code is the only option. The choices are similar, although not equivalent, to living in an authoritarian society as opposed to a free one.

Hacktivism chooses open code, mostly. Although there might be very specific instances where we would choose to obscure or hide code, going by the averages we support the same standards-based, open code methodology that built the Internet in the first place. It is germane that users of hacktivist applications sitting behind national firewalls in China and other repressive regimes are more worried about being caught with 'criminal software' than crashing their computers. End user safety is paramount in such instances, and if closing down code would prevent arrests, then so be it. Techno-correctness is a luxury of the already free.

There are numerous arguments for open code, from the rhapsodic possibilities of the Open Source Initiative, through the demotic juggernaut of the Free Software Foundation, to the debate laden pages of Slashdot with its creditable fetish for better security. And everyone is right in his or her own way. But there is another compelling reason to show the code apart from any technical or philosophical considerations.

The field is getting crowded.

Four years ago when cDc first started talking about hacktivism, most Internet users didn't know, or care, about things like state-sponsored censorship or privacy issues. But now the terrain has changed. Increasingly human rights organizations, religious and political groups, and even software developers, are entering the fray, each for unique reasons. It would be premature to call such an unlikely accretion of stakeholders a coalition. In fact, there is every reason to believe there are greater opportunities for carping over differences than leveraging common cause into shared success. But open code may become the glue that binds.

As more and more disparate groups attempt to loosen dictators' restraints over Internet, it's important to keep focused on their common goals and not petty differences. The more transparent and crystalline their progress towards collective goals becomes, the more likely it is that those objectives will be achieved. Open code, like the open and inclusive nature of democratic discourse itself, will prove to be the lingua franca of hacktivism. And perhaps more importantly, it will demonstrate that hacktivists are waging peace, not war.

In 1968 the Canadian communications guru Marshall McLuhan stated, "World War Three will be a guerilla information war with no division between military and civilian participation."

Anyone who's watched the Web after an international incident knows how true that statement is. Teenagers from China have attacked sites in Taiwan and the U.S., and vice versa, just to name one claque of combatants. And although the exchanges are more annoying than truly damaging, they do support McLuhan's theory. As the Internet erupts into battle zones, Hacktivists could become something akin to a United Nations peacekeeping force. But rather than being identified by blue helmets, they'll be recognized by the openness of their code and the quality and safety of their applications designed to defeat censorship and challenge national propaganda.

One key to countering the cadres of information censors in China and elsewhere is the fluidity of open code projects. Another is through peer-to-peer (P2P) networks. P2P has floated into public awareness mostly as a result of the Napster phenomenon. The 'peers' on the network are computers, and yet not so different from a society of peers in a democracy. Some are more powerful than others, but they all have common attributes. This is in contrast with the traditional, and more pervasive, client/server network mechanism, where little computers go to big ones and ask for something, be it a Web page, an application, or even processing power.

What is most interesting about P2P technologies is that they turn the much-ballyhooed Information Superhighway into a two-way street. Peers become both clients and servers, or 'clervers' as one naming convention has it. Files can be shared, a la Napster; or processes from one or many partner computers can be strung together to create supercomputers, among other things. What makes these systems attractive to hacktivist developers is they are difficult to shut down. Large central servers are easy to locate and take down. But clouds of peers in numerous arrays springing up around the datascape are far more problematic.

This is not to say that P2P networks are invincible. Napster got shut down. But when the salt is out of the shaker, it's hard to get it back in. With Naptser down, a legion of even more powerful file-trading devices arose to take its place. The fact that Napster was easy to use and didn't require a steep learning curve was also key to its success, other convergences notwithstanding. This is fundamental to anyone hoping to appeal to non-technical users, many of whom are partially blinded and deafened by national firewalls.

The target user is socially engaged, but not necessarily technically adept. Beneath the surface the programs can be as complicated as you please, but on top, from the functionality/usability perspective, the apps have to be dead simple and easy to use. And they have to be trustworthy.

Here is where the Napster analogy breaks down. Trust was never a paramount factor in using the application. It was a fun loving network developed on the free side of the firewall, where users' greatest worries were, a) Can I find what I want? b) How long will it take to download? c) Is it of good quality? and, d) Do I have time to download four more tunes before I go to the keg party?

No one ever had to ask, a) If I'm caught using this, will I be arrested? b) Is this application good for ten years in jail?

Having millions of students on the Napster network made sense because the more users there are on-line, the larger the lending library becomes. Users behind national firewalls cannot be so casual. Having millions of users on a network may be one thing, but only a fool would trust more than his or her closest friends when the consequences of entrapment are so high. Thus, carefree peer-to-peer networks are replaced by careful hacktivist-to-hacktivist (H2H) networks.

H2H networks are like nuclear families living in large communities. Everyone may live in the same area, but each family has its own home where the doors open, close, and lock. And occasionally, a family member will bring someone new home. Everyone will sit around the living room, and if all goes well, the guest will be shown the library, perhaps, and maybe even someone's bedroom. All of this is based on earned trust. H2H networks will operate along these lines, where families will share a space and grant permission to one another as well as to certain visitors. The greater the trust, the more permissions will be granted; and for guests visiting the home, trust will be earned incrementally.

This model is already in existence, more or less. Using the Internet to communicate between known and trusted computers is a fact of business life. Virtual Private Networks are used daily to communicate sensitive and proprietary data. The same can be done by taking elements of this model and marrying them to H2H network development. But saying is not doing, and even the best marriages can unravel and fail. It's important to realize these things are possible but have never been done before.

Building H2H networks is not just a matter of guessing at how particular technologies will respond under fire. Hackers must know what users in the field need. We have been telling anyone who will listen that hackers, grassroots activists, and other parties who care about Internet freedom and the growth of democracy must partner up and work together.

Hacktivismo has been working with Chinese hackers and human rights workers, and the collaboration has been both fruitful and energizing. Occasionally there are cultural conflicts, but this has nothing to do with where anyone was born, and everything to do with how people get things done. Hackers tend towards MIT professor Dave Clark's credo which states, "We reject: kings, presidents, and voting. We believe in: rough consensus and running code." Trust will come as development partners begin working more closely and learning that we aren't so different as we appear at the surface.

Research and development is phase one. Then comes distribution. Hackers have never had a problem distributing software. If you write something worth running, it will end up in every corner of the globe, something else we've learned from experience.

Leveraging existing distribution channels with those of our partners will ensure that users who most need liberating software will get it. Some human rights organizations have vast e-mail databases that will become increasingly invaluable for raising awareness, and in some instances, act as a distribution layer. Other areas of co-operation are also possible, especially in translations for non-English users where documentation and re-skinning U.I.s [the process of replacing the user interface of an application from, say, English to Chinese, or Arabic, etc.] will take development to ever-wider usefulness.

Last, although certainly not least, we need to acknowledge the Chinese government for their unwitting contributions to Hacktivismo's work. After reverse engineering some of their fundamental technologies we've discovered a few cracks where the light might shine through. But it does raise the question: why are we put in the position of doing this work? With billions of dollars in government budgets at their disposal, when are the world's liberal democracies going to put some of their resources into opening up the Internet? We know they don't care about human rights policy when it conflicts with jobs at home; but what about international security? As Beijing continues to play the patriotism card domestically, a more open Internet could diffuse traditional xenophobia through greater one-on-one interaction on-line.

But until Western governments become engaged, the main challenge for hackers is to keep focused on the goal of liberating the Internet. We realize that, but for the grace of God, we could be sitting on the other side of the firewall. It's a sentiment that is being picked up, although it would be a lie to say that thousands of hackers want to get into the game.

Still, enough are beginning to take up this cause that we should be able to see results, if new partnerships hold. There's a new generation of freedom fighters, sitting behind computers, who believe that it can be done.

Occupy livestream operators homeless after getting out of jail

TheAtlanticWire | A little after 10 p.m. on Wednesday, the six volunteers with the Occupy Wall Street live stream aggregator Globalrevolution.tv got out of jail in Brooklyn after they were arrested Tuesday for defying a city notice to vacate their building. A video of them immediately after their release showed them in good spirits, smoking cigarettes and eating cookies after about 30 or so hours in jail. After a lengthy tirade about corruption in law enforcement and a racially imbalanced jail population, Vlad Teichberg, one of the project's key organizers, said, "it's really good to be out."

Original: Some of the six people arrested on Tuesday for violating a New York City order to vacate a building where the Global Revolution live stream is produced actually live there and won't be able to return once they're released from jail, which is expected sometime Wednesday afternoon.* One of the live stream's key organizers, Vlad Teichberg, is a resident of 13 Thames St., the Bushwick, Brooklyn space that had recently served as the headquarters of Occupy Wall Street live feed aggregator Globalrevolution.tv. He and five other residents-cum-volunteers are still in police custody after they were hauled in for trespassing, obstructing governmental administration, and resisting arrest, Global Revolution organizer Nigel Parry told The Atlantic Wire on Wednesday.

The space at 13 Thames St., in Brooklyn is "kind of like a punk house, art space type thing," Parry said. "Global Rev. has only just been moved there. But everyone who was arrested there has been there for quite a while ... Vlad and some others had been living there for a year or two." Tuesday's raid wasn't the first time the cops have visited the space. In April, 2010, police stopped by, reportedly entering without a warrant, as people at 13 Thames made plans for an anarchist film festival. The cops "accused the occupants of being illegal squatters and demanded identification." Two who were at the space and showed their identifications turned out to have warrants and were arrested, The New York Times reported. In a November 2011 feature, the Greenpoint Gazette reported on the 40 or so creative types who work out of the space, recording albums, doing art, and practicing music. On Wednesday, Parry cited a rumor that the notice to vacate with which police served the space on Tuesday came from a year-old sprinkler violation. We've reached out to the New York Buildings Department to get the exact nature of the violation and will update this post when we hear back from them.

Meanwhile, Global Revolution and others on Twitter are taking issue with the charges reportedly filed against the six Global Revolution organizers that they resisted arrest. As for the live stream itself, Parry said organizers had already set up off-site mixing capabilities, and could manage the feed aggregator from anywhere. "As Vlad said the night after [Monday's notice to vacate], we can do this from laptops. I'm in Pittsburgh. In the first weeks of Occupy Wall Street, the channel was being mixed in Pittsburgh, Minnesota and New York." The channel is currently airing a feed from Greece, but Parry said it carried live feeds of Occupy actions at the Iowa Republican caucuses.

the eff punks out on bitcoin...,

themonetaryfuture | To stand up and fight to protect lawful online activity from legal threats isn’t for the faint of heart… it takes big ones.

The Electronic Frontier Foundation has a two decade history of taking on cases that set important precedents to protect rights in cyberspace. This is an organisation which has not been afraid to file lawsuits against the CIA, the US Department of Defence, the Department of Justice and other agencies, as well as major corporations like Apple and AT&T.

Recently, however, the EFF seems to be blowing some chilly air of its own and their source of gumption seems to have shrunk a little. They are no strangers to the pernicious effects of ‘self-censorship’; this is the ‘chilling effect’ where discussion, debate and activities are effectively destroyed before they even get started. It is the fear to speak freely or the fear to participate, because of vague legal threats or ill-defined laws. It is the uncertainty about where one’s rights begin and end, and the fear of crossing an invisible line. It is the providers closing or restricting customer accounts; not based on specific legal requests but based on some fuzzy margin even less well defined than the law itself.

Let’s see how the EFF explains its retreat from using one specific technology: Bitcoin, which is not inherently illegal and qualifies more than most as a frontier technology.

EFF and Bitcoin (June 20, 2011)

What then should we make of this statement from the EFF which reveals a primary motivator for avoiding a particular technology is legal uncertainty? At first glance this might make some sense, as ‘understanding the legal issues’ seems like a prudent first step, but you only need to step back into the EFF’s early history to see that their very birth was not just taking place in, but in a way inspired by an era of just this sort of uncertainty regarding electronic frontiers. Take this quote from ‘A Not Terribly Brief History of the EFF’.
"I realized in the course of this interview that I was seeing, in microcosm, the entire law enforcement structure of the United States.
Agent Baxter was hardly alone in his puzzlement about the legal, technical, and metaphorical nature of data crime."
This surely shows that the legal environment was not only uncertain – but positively muddy and misunderstood even by those tasked to investigate and enforce the law.

Arguably, law enforcement lags in their understanding of new technology just as much today. The ‘ambiguous nature of law in Cyberspace’ was almost a defining feature of the landscape, and back then, it didn’t stop the EFF from riding out into it; legal guns at the ready, if not blazing.

The EFF about-face regarding Bitcoin came shortly after a flurry of publicity regarding US Senators Schumer and Manchin raising their concerns about the use of bitcoins for illegal purchases on the silk road tor website. The senators mischaracterised bitcoin as “untraceable”. Senators seek crackdown on “Bitcoin” currency Fist tap Dale.

Monday, January 09, 2012

who will "they" pretend next is trying to hurt "us"?

warmaking to render babies 'incompatible with life"


aljazeera | While the US military has formally withdrawn from Iraq, doctors and residents of Fallujah are blaming weapons like depleted uranium and white phosphorous used during two devastating US attacks on Fallujah in 2004 for what are being described as "catastrophic" levels of birth defects and abnormalities.

Dr Samira Alani, a paediatric specialist at Fallujah General Hospital, has taken a personal interest in investigating an explosion of congenital abnormalities that have mushroomed in the wake of the US sieges since 2005.

"We have all kinds of defects now, ranging from congenital heart disease to severe physical abnormalities, both in numbers you cannot imagine," Alani told Al Jazeera at her office in the hospital, while showing countless photos of shocking birth defects.

As of December 21, Alani, who has worked at the hospital since 1997, told Al Jazeera she had personally logged 677 cases of birth defects since October 2009. Just eight days later when Al Jazeera visited the city on December 29, that number had already risen to 699.

"There are not even medical terms to describe some of these conditions because we've never seen them until now," she said. "So when I describe it all I can do is describe the physical defects, but I'm unable to provide a medical term."

'Incompatible with life'

Most of these babies in Fallujah die within 20 to 30 minutes after being born, but not all.

Four-year-old Abdul Jaleel Mohammed was born in October 2007. His clinical diagnosis includes dilation of two heart ventricles, and a growth on his lower back that doctors have not been able to remove.

Abdul has trouble controlling his muscles, struggles to walk, cannot control his bladder, and weakens easily. Doctors told his father, Mohamed Jaleel Abdul Rahim, that his son has severe nervous system problems, and could develop fluid build-up in his brain as he ages, which could prove fatal.

"This is the first instance of something like this in all our family," Rahim told Al Jazeera. "We lived in an area that was heavily bombed by the Americans in 2004, and a missile landed right in front of our home. What else could cause these health problems besides this?"

Dr Alani told Al Jazeera that in the vast majority of cases she has documented, the family had no prior history of congenital abnormalities.

Alani showed Al Jazeera hundreds of photos of babies born with cleft palates, elongated heads, a baby born with one eye in the centre of its face, overgrown limbs, short limbs, and malformed ears, noses and spines.

She told Al Jazeera of cases of "thanatophoric dysplasia", an abnormality in bones and the thoracic cage that "render the newborn incompatible with life".

the art of creating enemies to go out and fight..,

Sunday, January 08, 2012

educating americans in the subtle art of imperial domination?

andrewgavinmarshall | In the 1950s, the Ford Foundation and Carnegie Corporation facilitated the development of African studies in American universities to create an American elite well-trained and educated in being able to manage a more effective foreign policy over the region. Another key project was in developing the Foreign Area Fellowship Program, where American social scientists would have overseas research subsidized by the Ford Foundation. The fellows also became closely tied to the CIA, who saw them as important sources of information to recruit in the field. However, when this information began to surface about CIA connections with foundation-linked academics, the Ford Foundation leadership became furious, as one Ford official later explained that the President of the Foundation had gone to Washington and “raised hell,” where he had to explain to the CIA that, “it was much more in the national interest that we train a bunch of people who at later stages might want to go with the CIA… than it was for them to have one guy they could call their source of information.”[26] It is, perhaps, a truly starting and significant revelation that the president of a foundation has the ability, status, and position to be able to go to Washington and “raise hell,” and no less, lecture the CIA about how to properly conduct operations in a more covert manner.

The Carnegie Corporation, for its part, was “encouraging well-placed American individuals to undertake study tours of Africa.” In 1957, the Carnegie Corporation gave funds to the Council on Foreign Relations to undertake this task of identifying and encouraging important individuals to go to Africa. Among the individuals chosen were Paul Nitze, who became Assistant Secretary of Defense for International Security Affairs in 1962; Thomas Finletter, a former Secretary of the Air Force; and David Rockefeller of Chase Manhattan Bank.[27]

The Rockefeller Foundation also initiated several funding programs for universities in Latin America and Asia, notably in Peru, Colombia, Brazil, Thailand, the Philippines and Indonesia. By the early 1980s, the Rockefeller Foundation had awarded over 10,000 fellowships and scholarships. From the Ford Foundation’s inception in 1936 until 1977, it had allocated roughly $919.2 million to “less-developed countries.”[28] The Ford Foundation even maintained “a steady stream of scholarly exchange with the Soviet Union and other countries of Eastern Europe since 1956, and with the People’s Republic of China since 1973.” Ford and other foundations had also played significant roles in channeling intellectual dissent in developing nations into ‘safe’ areas, just as they do at the domestic level. This has required them to fund several radical (and sometimes even Marxist) scholars. The Ford Foundation had also supported the relocation of displaced scholars following the military coups in Argentina in 1965 and Chile in 1973. However, such foreign ‘assistance’ has not gone unnoticed entirely, as in 1971 there was violent resistance by radical university students and faculty at the University of Valle in Colombia, “a favored recipient of Ford and Rockefeller monies.”[29] As noted in the book, Philanthropy and Cultural Imperialism:
The power of the foundation is not that of dictating what will be studied. Its power consists in defining professional and intellectual parameters, in determining who will receive support to study what subjects in what settings. And the foundation’s power resides in suggesting certain types of activities it favors and is willing to support. As [political theorist and economist Harold] Laski noted, “the foundations do not control, simply because, in the direct and simple sense of the word, there is no need for them to do so. They have only to indicate the immediate direction of their minds for the whole university world to discover that it always meant to gravitate to that angle of the intellectual compass.”
It is interesting to note the purposes and consequences of foundation funding for highly critical scholars in the ‘developing’ world, who are often very critical of American economic, political, and cultural domination of their countries and regions. Often, these scholars were able to collect information and go places that Western scholars were unable to, “generating alternative paradigms which are likely to provide more realistic and accurate assessments of events overseas.” One example was the funding of dependency theorists, who rose in opposition to the prevailing development theorists, suggesting that the reason for the Global South’s perceived “backwardness” was not that it was further behind the natural progression of industrial development (as development theorists postulated), but rather that they were kept subjugated to the Western powers, and were specifically maintained as ‘dependent’ upon the North, thus maintaining a neo-imperial status directly resulting from their former overt colonial status. Thus, the foundations have gained better, more accurate information about the regions they seek to dominate, simultaneously employing and cultivating talented scholars and professionals, who might otherwise be drawn to more activist areas of involvement, as opposed to academic. Thus:
[A] situation exists where information, produced by Latin Americans on situations of internal and external domination, is flowing to the alleged sources of oppression – rather than toward those who need the information to defend themselves against exploitation.
An example of this is in Brazil, where a regime tolerated the writings of radical social scientists who are supported by foundations. Many of these scholars have received international recognition for their work, which would make it unlikely that the regime itself would be unaware of it. Thus, the work itself may not be perceived as an actual threat to the regime, for two major reasons:
(1) it is not intelligible to the masses, for certainly, if the same sentiments were expressed not in academic journals but from a street corner or as part of a political movement which mobilized large numbers, the individual would be jailed or exiled; and (2) the regime itself benefits from the knowledge generated, while simultaneously enhancing its international image by permitting academic freedom.
Thus, the ultimate effect abroad is the same as that at home: prominent and talented scholars and intellectuals are drawn into safe channels whereby they can aim and hope to achieve small improvements through reform, to ‘better’ a bad situation, improve social justice, human rights, welfare, and ultimately divert these talented intellectuals “from more realistic, and perhaps revolutionary, efforts at social change.”

Again, we have an image of the major philanthropic foundations as “engines of social engineering,” and agents of social control. Not only are their efforts aimed at domestic America or the West alone, but rather, to the whole world. As such, foundations have been and in large part, remain, as some of the most subtle, yet dominant institutions in the global power structure. Their effectiveness lies in their subtle methods, in their aims at incremental change, organizing, funding, and in the power of ideas. Of all other institutions, foundations are perhaps the most effective when it comes to the process of effecting the ‘institutionalization of ideas,’ which is, as a concept in and of itself, the central facet to domination over all humanity.

how the ford foundation created multiculturalism

Frontpagemag | Editor’s Note: One of the largest and most dangerous concentrations of unchecked power in the United States is the Ford Foundation with discretionary spending power that rivals that of government. It is spending power moreover, for the political left and often the hard left. As a public service Frontpage Magazine is devoting a series of articles to the malign influence of Ford. The story posted below, which originally appeared in Heterodoxy magazine, reveals Ford’s crucial role in creating the ideological movement called “multiculturalism” in our universities. -- David Horowitz.

The Pasadena Doubletree is an unlikely site for a conspiracy. The elegant pink structure is sumptuously landscaped and fragrant breezes circulate in the spacious courtyards even on the sultry afternoons of Southern California's Indian Summer. And the dozens of scholars from campuses all over the country who met here late last month did not look like revolutionaries. But behind closed doors of the meeting rooms, the conference of "Cultural Diversity Enhancement" had the tone of one of those "by any means necessary" conventions staged by SDS in the late 60s. The subject was how to turn American higher education inside out. It was sponsored by the Ford Foundation, whose strategy for a radical transformation of the university one critic has called "the academic equivalent of an 'ethnic cleansing.'"

In an afternoon session entitled "Restructuring the University," spokespersons summarized the thinking of the workshops that had taken place earlier that morning. Robert Steele, a Professor of Psychology at Wesleyan, noted that his group was aware that coercion would be required to change the university: "People will not be quietly assimilated to multiculturalism by truth through dialogue." They will have to be bought off as well as brought along. Steele described the terms of the deal: "You get research assistants, you give mentoring." In other words, using the largesse of Ford and other philanthropic institutions, advocates of multiculturalism convince the hesitant to join up by paying for research assistants. These assistants — mentors of multiculturalism — must be women or people of color. "We will have changed the university when women and people of color can see themselves running the place," Steele concluded.

Steele was followed by Jonathan Lee, a Philosophy Professor at Colorado College, who began by reporting that the workshop he represented had wondered if "consensus was an appropriate goal." That is, should advocates of multiculturalism act as a popular front or a vanguard? One of Lee's prescriptions for success was to "divorce courses from instructors" — that is, conceive and institute courses without regard to those who would be doing the teaching. Continuing in this vein. Lee reported that his group had considered the question, "Is the multicultural approach an adaptation or a revolutionary transformation? They had come down on the side of the more radical position: "At stake in multiculturalism is a direct challenge to privatized teaching, to privatized work and to privatized life." Even science, the one area so far immune to this radical transformation, would have to change, according to Lee: "Instead of teaching science as a doctrine divorced from its social context, we could teach science from a historical, economic perspective."

The final speaker was Eve Grossman, a Princeton dean, who said that her group had worried about tenure: "If we want to restructure the university, tenure stands in the way." She said that her group was aware that promotion and tenure were predicated on "discipline-based" research. Therefore "When we talk about changing things, we're really talking about something no less radical than changing disciplines." Grossman made it clear that her group of thinkers had kept their eyes on the prize: "If we want to change the world, we have to change the students."

As the session adjourned and the participants got ready to leave for a multicultural reception at the Asia-Pacific Center across the street from the Doubletree ("an important meeting place for the cultures of East and West"), it was hard not to feel a sense of unreality. How did the biggest foundation in the world get into the business of academic revolution? Why was Ford pushing so hard for the deconstruction of American higher education?

from black power to black studies...,

The black power movement helped redefine African Americans' identity and establish a new racial consciousness in the 1960s. As an influential political force, this movement in turn spawned the academic discipline known as Black Studies. Today there are more than a hundred Black Studies degree programs in the United States, many of them located in America's elite research institutions. In From Black Power to Black Studies, Fabio Rojas explores how this radical social movement evolved into a recognized academic discipline.

Rojas traces the evolution of Black Studies over more than three decades, beginning with its origins in black nationalist politics. His account includes the 1968 Third World Strike at San Francisco State College, the Ford Foundation's attempts to shape the field, and a description of Black Studies programs at various American universities. His statistical analyses of protest data illuminate how violent and nonviolent protests influenced the establishment of Black Studies programs. Integrating personal interviews and newly discovered archival material, Rojas documents how social activism can bring about organizational change.

Shedding light on the black power movement, Black Studies programs, and American higher education, this historical analysis reveals how radical politics are assimilated into the university system.

Wikipedia | One of the major setbacks with Black Studies/African American Studies Programs or departments is that there is a lack of financial resources available to student and faculty. Many universities and colleges around the country provided Black Studies programs with small budgets and therefore it is difficult for the department to purchase materials and staff. Because the budget allocated to Black Studies is limited some faculty are jointly appointed therefore, which causes faculty to leave their home disciplines to teach a discipline of which they may not familiar. Budgetary issues make it difficult for Black Studies Programs and departments to function, and promote themselves.

Racism perpetrated by many administrators hinders the institutionalization of Black Studies at major university. As with the case of UC Berkeley most of the Black Studies programs across the country were instituted because of the urging and demanding of black students to create the program. In many instances black students also called for the increased enrollment of black students and offer financial assistance to these students. Also seen in the case of UC Berkeley is the constant demand to have such a program, but place the power of control in the hands of black people. The idea was that black studies could not be “realistic” if it was not taught by someone who was not accustomed to the black experience. On many campuses directors of black studies have little to no autonomy—they do not have the power to hire or grant tenure to faculty. On many campuses an overall lack of respect for the discipline has caused instability for the students and for the program.

In the past thirty years there has been a steady decline of black scholars.

Saturday, January 07, 2012

the hoodwink and bamboozle of warsocialism...,

ClubOrlov | The lesson that the United States desperately needs to learn is that their trillion-dollar-a-year military is nothing more than a gigantic public money sponge that provokes outrage among friends and enemies alike and puts the country in ill repute. It is useless against its enemies, because they know better than to engage it directly. It can never be used to defeat any of the major nuclear powers, because sufficient deterrence against it can be maintained for relatively little money. It can never defuse a popular insurgency, because that takes political and diplomatic finesse, not a compulsion to bomb faraway places. Political and diplomatic finesse cannot be procured, even for a trillion dollars, even in a country that believes in extreme makeovers. As Vladimir Putin put it, “If grandmother had testicles, she’d be a grandfather.”

Reinventing Collapse, 2nd ed., p. 41 Fist tap Dale.

lehman bros. wreaked global havoc...,


WSJ | In this 23 minute documentary, Wall Street Journal editors and reporters examine the origins of Europe’s debt crisis and why it spread with such ferocity to engulf much of the continent and threaten the entire world.

why politicians ONLY represent the status quo...,

corrupt congress going through motions hearing about corrupt banksters...,

Fuck Robert Kagan And Would He Please Now Just Go Quietly Burn In Hell?

politico | The Washington Post on Friday announced it will no longer endorse presidential candidates, breaking decades of tradition in a...