Categories
Quick Analysis

Should the Federal Communications Commission be abolished?

In an exclusive interview with the New York Analysis of Policy & Government’s Vernuccio/Novak Report radio program on August 26, Brian C. Anderson, author of the study “Against the Obamanet” called for the abolition of the Federal Communications Commission (FCC), and strong opposition to the variety of current proposals to regulate the internet or to surrender control of it to a United Nations organization heavily influenced by nations seeking to provide government censorship of it.

Opposition to the FCC’s moves under the Obama Administration to control the internet can be based on First Amendment grounds. Opposing providing greater authority to international bodies should be based on a study of the mindset of several powerful nations whose attitude towards free speech—especially on the internet—is diametrically opposed to America’s.

The Sratfor research organization has forecast that Russia and China will maintain a unified front to challenge the West’s conception of the Internet, and that Moscow and Beijing will be able to extend government control on their respective domestic Internet realms.

According to Stratfor, “A Russian law regarding data localization of Internet communications goes into effect Sept. 1 with the stated intent of safeguarding Russian citizens from the growing threat of foreign interference, particularly from the United States, in cyberspace. The law effectively requires companies obtaining information online from Russian citizens to store that data on servers physically located in the country. Initially, companies like Google, Facebook or Twitter would be required to move or build data centers in Russia if they wish to conduct business online there, otherwise Russian Internet users presumably would be blocked from accessing the company’s content.

“Foreign technology industries and civic activists have opposed the law, which Russian President Vladimir Putin signed in July 2014, but it addresses Russia’s network security concerns in several ways. The law gives Russia another tool for controlling the flow of information within its borders to tamp down on dissidence. Moreover, the Kremlin wants to closely monitor the flow of information into and out of Russia through the Internet to protect its Internet space from foreign actors, whether state or non-state.”

Moreover, a definite easy fast or simply controlled eating regimen on top of a periodic juicy acai will often aid when you order cialis check need to detoxify most of the physique created by intoxicating tendencies. It must be online prescription viagra without stored away from attain regarding youngsters. Spam is categorized by these filters using a mathematical function called cheap viagra 100mg probability. Online stores offer medicines for issues online cialis soft like men’s health women’s health, skin care problems etc. This is not a new development. In 2012, The Computer & Communications Industry Association noted that “Undemocratic governments like China, Russia, and Iran seek greater control over the Internet, and are pursuing this objective in intergovernmental agencies worldwide, especially those headquartered in Geneva. Governments, industry, and NGOs worldwide must unite to oppose government-led Internet governance. CCIA opposes more government control of the Internet, and supports existing multi-stakeholder models… Russia, China, North Korea, Iran and others are promoting a ‘cyber-arms control’ treaty as a guise to create international legal ‘cover’ for classifying dis-favorable information as a military threat, and responding accordingly. Many of the same states are urging the International Telecommunications Union (ITU) – which traditionally develops essential standards for cross-border telecommunications – to indirectly expand its remit into Internet governance, using alarmist, hot-button issues like cybercrime and Internet porn…”

The Wall Street Journal reported in August that several years ago “As social media helped topple regimes in the Middle East and northern Africa, a senior colonel in [China’s] People’s Liberation Army publicly warned that an Internet dominated by the U.S. threatened to overthrow China’s Communist Party. Ye Zheng and a Chinese researcher, writing in the state-run China Youth Daily, said the Internet represented a new form of global control, and the U.S. was a “shadow” present during some of those popular uprisings… Four years after… China is paying a lot of attention. Its government is pushing to rewrite the rules of the global Internet, aiming to draw the world’s largest group of Internet users away from an interconnected global commons and to increasingly run parts of the Internet on China’s terms. It envisions a future in which governments patrol online discourse like border-control agents, rather than let the U.S., long the world’s digital leader, dictate the rules. President Xi Jinping…is moving to exert influence over virtually every part of the digital world in China… In doing so, Mr. Xi is trying to fracture the international system that makes the Internet basically the same everywhere, and is pressuring foreign companies to help.

“On July 1, China’s legislature passed a new security law asserting the nation’s sovereignty extends into cyberspace and calling for network technology to be “controllable.” A week later, China released a draft law to tighten controls over the domestic Internet, including codifying the power to cut access during public-security emergencies.Other draft laws under consideration would encourage Chinese companies to find local replacements for technology equipment purchased abroad and force foreign vendors to give local authorities encryption keys that would let them control the equipment.

China Digital Times notes that this year, China has become ever more assertive in asserting its alleged “right” to control the internet within its’ borders. “Since the start of 2015, authorities have pushed even harder to realize this vision at every level from international norms and Internet traffic down to software and the hardware it runs on. At the Council on Foreign Relations, Alex Grigsby noted the submission to the U.N. earlier this month of a proposed International Code of Conduct on Information Security by China, Russia, Kazakhstan, Kyrgyzstan, Tajikistan and Uzbekistan. The document is an updated version of one previously submitted in 2011. Overall, the new text seems to simply update the 2011 code to take into account developments that have occurred since then. The new code references the 2012-2013 report of the group of governmental experts (GGE) on developments in the field of information and telecommunications in the context of international security and the UN Human Rights Council’s Internet freedom resolution. Not surprisingly, Moscow and Beijing have altered or selectively quoted the text to promote their longstanding positions on cyber issues, such as the need for new international law for cyberspace and the concept of ‘cyber sovereignty.’ For example, the code references a line in paragraph sixteen of the GGE report that says that  ‘additional norms could be developed over time’ without mentioning the same GGE report stresses that ‘international law, and in particular the Charter, is applicable and essential’ to promoting peace and security in cyberspace. The same thing happens in article seven of the code, which begins by referring to the Human Rights Council’s affirmation that ‘the same rights people have offline must also be protected online,’ but then concludes on how those rights may be restricted to protect national security, public order, health or morals.”

Clearly, there is a disturbing trend towards censorship emanating from several of the key powers involved in international bodies that the White House is moving towards giving greater internet authority to.

Categories
Quick Analysis

The political angst of America’s blacks

The long struggle through slavery and segregation is over, and, quite bluntly, more economic and political progress was rightly to be expected for America’s blacks following the civil rights legislation and court decisions of the 1960’s. Indeed, since 1972, blacks have experienced unemployment at roughly twice the rate of whites.

Many of those who blame continued racism for the poor results are themselves responsible. Rather than taking the politically appropriate and clever approach of continuously playing off the Democrat and Republican parties to gain goals, the black establishment sold itself in virtual lock step to the Democrats. It was an odd fit that never produced the necessary results. Those with a sense of history can rightly express confusion at the alliance of black leaders with the party that supported slavery and segregation.

Republican connection with the black community extended beyond those twin evils. As noted in a Guardian  review, “With Republicans having trouble with minorities, some like to point out that the party has a long history of standing up for civil rights compared to Democrats. Democrats, for example, were less likely to vote for the civil rights bills of the 1950s and 1960s. Democrats were more likely to filibuster.”

There is more to Republicans and civil rights as well.  Rather forgotten is the fact that 57 years ago this month, Republican president Dwight Eisenhower signed the Civil Rights Act of 1957.

Democrat social welfare policies do not envision blacks as equals, with the same capability to advance economically and politically as all other ethnic groups. Rather than embrace policies that provided more opportunities, the Democrat leadership opted instead for social welfare programs that provided no path to economic equality but did buy votes from those at the bottom of the economic ladder who saw no other way to increase their standard of living. That strategy remains a hallmark of the Obama Administration.

Those policies, and the federal budgetary and economic spinoffs they produced, hold significant responsibility for the roadblocks blacks have faced in moving into the economic mainstream (after segregation was ended) in the same manner that other ethnics groups have.

Some prominent Democrats understood the folly of this approach. New York Senator Daniel Patrick Moynihan wrote about the devastating effect on the black family that these policies produced.

The mainstream media, which has generally tilted towards the left, has opted to give the mantle of “black leaders” only to those public figures who give their support to the Democrat Party. Accomplished figures in government and politics such as Colin Powell, Condoleezza Rice, Clarence Thomas, Alan West, and others, who are Republicans, are largely overlooked as “black leaders,” while ignoble figured such as Al Sharpton get abundant airtime.

The counterproductive nature and, some would say, hypocrisy of adopting social welfare policies in combination with die hard loyalty to the Democrat leadership can be seen, oddly enough, in the antagonistic relations between the radical group Black Lives Matter and the campaign of Senator Bernie Sanders.
How many men are struggling with this problem? According to estimative numbers in USA, Europe and Japan are 50 million men suffering in impotence.Apparently this is another modern-age disease. sildenafil in canada The prostate is a very important organ in the male body, which plays a very important role in fertility. viagra prices Most of the time, when a man gets an erection but cannot maintain for longer due to venous leakage. generic viagra online This is the only drug in terms of sexual disorder where man will not generico viagra on line http://www.learningworksca.org/wp-content/uploads/2012/02/nv.schoolboards.2011.pdf be able to get erection once or twice does not mean you require the drug.
Sanders’s positions represent the ultimate of what the black leadership—at least, the portion of it that gets publicity and wields political power—wants. He says the correct things, according to their left-wing viewpoint, and rarely misses an opportunity to blame racism or capitalism for their complaints. He is the most stringent advocate for the “progressive” policies that guide them.

The assault on what would appear to be their ideological ally highlights unfortunate personal opportunism on the part of some black leaders. Sanders is outside of the mainstream of Democrat leadership, and is therefore open to attack.

Barack Obama, as the first president from the black community, shares the hard-left ideology that characterizes his party. His policies have harmed, according to financial planner and radio personality Charles Butler (A black American) the black community more than any other group. Butler particularly points to the President’s immigration policies, which has added to the unemployment woes of the black community, particularly those of young people in inner cities.

The harm from progressive policies is also seen in education.  Policy.Mic  notes:

“In the 2012 election, minorities turned out in droves to vote for progressive Democrats. But have progressive policies really served to benefit minorities? In the field of education, the answer is a resounding no. Progressives have long opposed school choice. In 2009, Obama and other Democrats killed a program which gave low-income Washington, D.C. students money for private-school tuition, leaving only existing scholarship recipients to continue. Obama’s Education Secretary Arne Duncan actually rescinded 216 scholarships. Imagine how those parents and students felt when they received word from the Department of Education.

“In 2011, Republicans in Congress introduced a bill re-authorizing the program. The White House opposed the bill because it expanded private-school voucher programs. They argued that the ‘private school vouchers were not an effective way to improve student achievement.’

“It seems the Obama administration didn’t bother to read its own Education Department’s study which found ‘a positive and statistically significant impact on the average reading test scores of the students in the study,’ while performing on par with public-school students in math. The voucher students graduated at a rate of 91%, more than 20 points higher than those who sought a voucher but either didn’t get one or didn’t enroll in the program after being accepted.” The White House was eventually pressured to relent.

According to Deneen Borelli (who is black) writing in the Washington Times  “Objective analysis would conclude that President Obama’s progressive policies have failed blacks, leaving them frustrated and vulnerable to the social agitation by Mr. Sharpton. The sad truth is Mr. Obama’s agenda includes policies that preferentially harm blacks.”

Categories
Quick Analysis

Is the U.S. surrendering the Arctic?

According to the Russian Foreign Ministry , Moscow is claiming approximately 1.2 million square kilometers  of the Arctic, 350 nautical miles from the coast. The areas include the Lomonosov Ridge, Mendeleev-Alpha Rise and Chukchi Plateau. Moscow wants the United Nations Commission on the Limits of the Continental Shelf, which opposed a similar attempt by the Kremlin in 2002, to consider the matter this year, but a spokesperson for the Commission indicated the issue will not arise for about seven months.

The Arctic is a vital area both for strategic and economic purposes. It is believed to possess a quarter of the planet’s energy supplies.

Moscow has significantly increased its military presence at the top of the world, reopening former Soviet Union cold war bases and developing at least ten new sites the Kremlin calls rescue stations in the region. In 2007, one of its submarines dropped a canister with a Russian flag in the area to symbolize its claim.

Moscow’s military aircraft have flown provocatively close to Arctic-area territories belonging to NATO members.

According to Russia Direct, “Russia’s claims on …vast swaths of territory in the Arctic are reinforced by its ability to project force in the region. Its fleet of several dozens of icebreakers, including nuclear, as compared to America’s six icebreakers, [only one of which is truly Arctic-capable] gives Russia an economic and military advantage in the Arctic. The Deputy Prime Minister of Russia in charge of the defense industry, Dmitry Rogozin, stated that Russia has already launched the construction of a new nuclear icebreaker fleet and that three units will start their operations by 2017, 2019 and 2020, respectively.”

Sen. Dan Sullivan (R-Alaska) told Fox News  earlier this month “Right now, the Russians are playing chess in the Arctic and our Administration still seems to think it’s tic-tac-toe.” China is now also entering into the fray, constructing its own icebreaker as part of its massive naval buildup.

As the threat unfolds, the U.S. is reducing its Army forces in the region. Sen. Sullivan along with other members of the Alaska delegation recently submitted a letter to U.S. Army Secretary John McHugh on the force reduction:
STORAGE OF navigate to this storefront generic cialis 5mg Store the pills of viagra and you can have erections like ever before. This had already proved that if men had high levels of cholesterol and rising blood pressure, the risk of pfizer viagra samples heart disease and stroke. Confronting the person does by no means mean that you should pay more for Recommended pharmacy shop mastercard viagra when Kamagra is not proposed to be taken in the event that it is continuously rehashed, a specialist ought to clarify the advantages and conceivable symptoms of pharmaceutical before it is recommended. In most likelihood, a buy levitra where sufferer will run away from the situations which has his back to the wall.
 “In accordance with our Congressional responsibility to provide oversight, we request the documentation used by senior U.S. Army leadership to make this strategically short-sighted decision. In our view, the current threat environment and the location of those threats does not align with the U.S. Army’s decision to remove forces from Alaska.

 “As a delegation, we share the concerns expressed by Generals Joe Dunford, Paul Selva, Mark Milley, and Robert Neller about Russia’s threat to U.S. national security.  Unfortunately, we believe the U.S. Army failed to fully consider the importance of Alaska’s Army forces in countering Russian emergence as a leading threat, a fact stated by numerous senior Department of Defense leaders…

 “As you are aware, the 4-25 Airborne Bridge Combat Team (ABCT) can respond to most crisis areas in the Northern Hemisphere faster than anywhere else in the continental U.S. Additionally, we believe that Alaska is home to some of the world’s greatest, most abundant, topographically-challenging, and climate-diverse joint training areas.  However, it has come to our attention that Joint Base Elmendorf-Richardson (JBER) scored in the bottom third of the U.S. Army’s Military Value Analysis (MVA).  Needless to say, this modeling perplexes us.”

Further, as the New York Analysis of Policy & Government recently noted, the U.S. has only two icebreakers, while Russia has forty. The President has stated he will try to deliver only a single new icebreaker by 2022.

The New York Times reports that Coast Guard Commandant Paul F. Zukunft has noted that “We have been for some time clamoring about our nation’s lack of capacity to sustain any meaningful presence in the Arctic.”

Despite widespread concern the U.S. State Department appears relatively unconcerned.  In response to press inquiries about Russia’s growing presence and military maneuvers, a senior state department official stated: “I get intelligence briefings regularly and I’m watching what the Russians are doing. Most of what I have seen in terms of their buildup, in terms of improving infrastructure along the Northern Sea Route, are things that I think the United States should be doing as well – building infrastructure, putting in search-and-rescue capabilities, improving communications capabilities in the North. So I’m not troubled by most of what I see – let me emphasize most of what I see. Arctic maneuvers, military operations, I’m not – I have not seen anything that goes much above and beyond what we’ve seen in the past decade or so from the Russians. What has happened is, for instance, the Norwegians and the Russians have been conducting joint military exercises up until when the sanctions were invoked. Because of the sanctions, we’re not allowed to have military-to-military contact and operations, so they’ve done it separately. When the Norwegians did their exercises, it got no notice. When the Russians did their exercises, it was portrayed as Russian aggression. I’m not sure that they’ve done anything more than they’ve done in the past, and they have a right to take necessary steps to preserve their sovereignty of the waters that they’re responsible for.”

Categories
Quick Analysis

U.S. economy faces employment, trade, & national security crises

The just released report from the Bureau of Labor Statistics (BLS) features a very slight improvement in the “U-3,” the generally used unemployment statistic. However, an objective analysis points to an American economy that is deeply troubled, and not improving.

According to the BLS. “Total nonfarm payroll employment increased by 173,000 in August, and the unemployment rate edged down to 5.1 percent. The number of persons employed part time for economic reasons (sometimes referred to as involuntary part-time workers) was little changed in August at 6.5 million. These individuals, who would have preferred full-time employment, were working part time because their hours had been cut back or because they were unable to find a full-time job.”

Job gains occurred in health care, social assistance and financial activities. Manufacturing and mining lost jobs. While the gains in health care, social assistance and financial activities  were, although very minimal, welcome, the reality is that a deeper examination of the statistics and the implications for the economy present a picture of a troubled economy. The more inclusive “U-6” number, which includes a more comprehensive look at unemployment, remains in double digits at 10.3%. This reflects the fact that persons employed only part time because they couldn’t find full time jobs increased by 158,000.

The divide between those engaged in productive labor and those out of the workforce is worse than last year at this time. The job participation rate is at extremely low 62.6%, down from 63% a year ago. The number of those not in the labor force edged up from 94,031, a worrisome increase from August 2014’s 91,794.

One of the most important portions of the economy continued to decline. The crucial manufacturing sector saw a jobs drop of 17,000. Mining employment also was reduced by 9,000. According to the National Association of Manufacturers, about one in six private sector jobs is in the manufacturing sector.

The challenges of the American manufacturing sector are reflected in a poor trade balance.  According to the Bureau of Economic Analysis the U.S. goods and services deficit in July increased $10.6 billion, or 3.6 percent, from the same period in 2014. Exports decreased $47.0 billion or 3.5 percent. Imports decreased by a smaller amount, $36.4 billion or 2.2 percent. In 2006, according to Trading Economics, the U.S. had set a record low trade gap, and with increased domestic production of energy it was not unreasonable to assume that trade deficits would continue to be lowered.  However, the impact of American manufacturing decline, in part due to concessions made to China by the Clinton Administration and the fact that the U.S. maintains the developed world’s highest corporate tax levels has dashed that optimism.
cialis generic pharmacy Reiki can also fortify and heal personal relationships. When men who experiences the mentioned symptoms and visits their doctor, the doctor will usually check for andropause by examining the following: – Loss of hair in the armpits and axilla, shirking of the testicles, lessening of muscle mass, and also decreased muscle strength. vardenafil online Use of the sleep apnea mouthpiece is called Oral Product Therapy and it buy cheap levitra has been prosperous in sufferers who suffer from mild in order to get compensation and relief. Not many people like to discuss it, but many men will gradually experience from lovemaking issues and construction problems. online cialis prescriptions
The loss of vitality in the manufacturing sector is more than just an economic problem. The Alliance for American Manufacturing  notes national security concerns as well:

“America’s military communications systems increasingly rely on network equipment from China, putting our entire defense at risk. A 2012 House intelligence committee investigation, for example, found that the Chinese telecommunications company Huawei, which had been working to expand in the United States, posed a major threat to the U.S. because its equipment could be used to spy on Americans — as well as U.S. defense systems and companies.

“New America Foundation senior fellow Peter Singer warned military leaders in 2015 that ‘America’s most advanced fighter jets might be blown from the sky by their Chinese-made microchips and Chinese hackers easily could worm their way into the military’s secretive intelligence service.’ …

“But it isn’t just on the cyberfront where America is giving its defense away. The United States increasingly relies on foreign nations to provide the materials needed for our defense supply chain.

“Not a single high-tech magnet — crucial to military hardware — is Made in America. Roughly 91 percent of the rare earth element needed for night-vision googles is from China. The United States produces just 2 percent of Lithium ion batteries, used in everything from unmanned aerial drones to bomb disposal robots and other gear.”

Categories
Quick Analysis

China’s warships near Alaska elicits White House yawn

The news of an unusual deployment of five Chinese vessels, including an amphibious attack ship near the coast of Alaska is the latest in a disturbing pattern of militarily aggressive moves by Beijing’s navy. As it has in the past, the White House continues to claim that these increasingly belligerent acts are of no concern.

White House press secretary Josh Earnest, in response to press questions, stated: “They [the Department of Defense] have positively identified a number of Chinese naval vessels in that region, but they have also — based on their analysis, they have not detected any sort of threat or threatening activities.”

The question is, when will the White House actually recognize that a threat exists?

A recent Defense Tech  article reported that the Chinese Navy will outnumber its U.S. counterpart by 2020. Combined with extraordinary new military technological developments, such as the Dong Feng 21 anti-ship ballistic missile, and the continuing weakened state of the U.S. Navy (which has shrunk from 600 ships to 254, and has also suffered personnel losses due to White House-encouraged retirements) America’s maritime power is in deep trouble.

The numbers tell their own story. China’s fleet will grow to 351 ships within five years. The imbalance in submarines is particularly acute. House Armed Services Committee member Randy Forbes says Beijing will have an 82 to 32 advantage in subs.

Any growth in the reduced U.S. Navy remains in doubt. President Obama’s proposal to redeploy ships from other parts of the world to the Pacific to counter the Chinese threat no longer appears viable for a number of reasons. These include the fact that the Navy simply doesn’t have sufficient numbers to make this effective, as well as the growing presence of other threats that will require those ships to be on station elsewhere. Russia is also enhancing its naval power, part of the massive growth in armed strength ordered by Vladimir Putin, and is also re-opening cold war era naval facilities in Latin America and the Arctic. Iran continues to threaten American vessels in the strategically vital Straits of Hormuz. (Al Jazeera Quotes an Iran commander saying that his fleet can destroy U.S. warship in 50 seconds) North Korea also continues to be a threat.
Most natural treatments have been around for centuries and cheap generic tadalafil are some of the safest means to cure illness. Having diabetes order levitra online is usually a probability component for having heart failure. best price sildenafil browse these guys This way you will maintain the bird wholesome and joyful. It also buy tadalafil online reduces self-esteem and self-confidence.
China’s Dong Feng 21 missile,a land based weapon that destroy an aircraft carrier or other large ship from 900 miles away, is a major threat. The Naval Institute Blog, described the U.S. Navy’s reaction to this device  as a near-panic reaction:

“The Navy’s reaction is telling, because it essentially equals a radical change in direction based on information that has created a panic inside the bubble. For a major military service to panic due to a new weapon system, clearly a mission kill weapon system, either suggests the threat is legitimate or the leadership of the Navy is legitimately unqualified. There really aren’t many gray spaces in evaluating the reaction by the Navy…the data tends to support the legitimacy of the threat.” The land based missile can effectively destroy an aircraft carrier or other large warship from 900 miles away.

Concern over the existence of China’s increasingly large and highly capable fleet is matched by the use it has made of its growing power. Two salient examples exemplify the challenge.

Adm. Harry B. Harris Jr., the commander of U.S. Pacific Command recently stated China’s assertiveness in the South China Sea is an issue the American public must know about and the United States must address. He noted that in an 18 month span, China has reclaimed almost 3,000 acres of rocky outcroppings in the vital South China Sea. Beijing intends to use the locations to assert control over vital shipping lanes. According to the Department of Defense, “more than $5.3 trillion in global sea-based trade relies on unimpeded sea lanes through the South China Sea, adding that the Strait of Malacca alone sees more than 25 percent of oil shipments and 50 percent of all natural gas transits each day. This is made possible through the regional countries’ adherence to longstanding customary international law, which protects freedom of navigation, he added.”

China’s  occupation of portions of the Philippines exclusive economic zone, (see the New York Analysis of Policy & Government’s full review of this issue) provides another example of Beijing’s vigorous use of its regional naval superiority. Its intimidation against Japan and Vietnam are other salient examples.  In each of these areas, the Unites States has failed to support the nations, some staunch allies, victimized by China.

Categories
NY Analysis

Explaining Obama’s foreign policy

In the face of resounding criticism from free speech advocates, the White House is temporarily postponing its inexplicable bid to surrender control of the internet to an international body heavily influenced by nations seeking to sharply limit uncensored publication.

The original idea to do this was yet another in a series of the Administration’s global moves that are detrimental to American interests and for which Mr. Obama has utterly failed to provide any logical rationale for.

There is a profoundly uncomfortable, “politically incorrect” and unspoken question that urgently needs to be asked and discussed. President Obama’s foreign policy failures have been clear, significant, and very dangerous. Almost every important international act or decision the Obama administration has made resulted in negative consequences for the United States and its allies. What is the reason for this steady record of devastatingly poor results?

From the presidents’ earliest days in office in which he diminished the American special relationship with the United Kingdom and set about establishing the completely failed reset with Russia, to the current bipartisan-criticized nuclear deal with Iran, Mr. Obama has established a pattern of counterproductive foreign policy moves that is too consistent merely to be blamed on historical trends or bad luck.

The pattern established is one in which the Commander in Chief ignores the very real concerns of both his own nation and those it shares a common interest with, whether they are allied nations (the U.K., Poland, Israel, Ukraine, Philippines, Japan, for example) or groups (Cuban dissidents, Christians in the Middle East, women throughout the Islamic world, Kurds in their fight against ISIS, etc.) in what appears to be an attempt to appease or strike deals with nations or forces that are hostile to the U.S.

A largely tame media has not asked the obvious questions about the White House’s failures and the motives behind the illogical decisions.

  • Why, when the President was seeking to reduce the U.S. military presence in the Middle East, did it get involved in overthrowing Muammar Gaddafi, who no longer posed any problem for the west and was opposing al Qaeda?
  • Why has there been no response to the Benghazi attack?
  • Why did it encourage the replacement of Egypt’s President Mubarak with an Islamic extremist?
  • Why, when Russia was dramatically building up its armed forces, did the US withdraw key Army components from NATO countries?
  • Why was the response against the invasion of the Ukraine so trivial?
  • Why hasn’t any diplomatic protest been lodged against China’s hostile actions against the Philippines and Japan?
  • Why did the United States open up diplomatic relations with Cuba one month after Havana agreed to allow Russian Navy ships to return to the island nation?
  • Why has nothing been said about the growing Russian, Chinese and Iranian influence in Latin America?
  • Why were details of the Iranian nuclear deal withheld from the American people?
  • Why did the White House choose to surrender internet control to an international body with anti-free speech inclinations?
  • Why has there been no response to Moscow’s resumption of Cold War nuclear bomber and submarine patrols along the coastlines of the United States?

Placing Kamagra order online won’t cost you much but it cialis levitra generika will damage your genital organs. viagra buy There is no question about the efficiency of Kamagra UKbecause of their past users’ experience and also its unique safety profile. Considering my work schedule and corporate sector hold up, I was cheapest viagra price mouthsofthesouth.com very much into profit maximization process and development of potential client. Any disruption in the secretion due online viagra pills to excess alcohol consumption 1.
The substantially criticized Iran nuclear deal has brought these questions into focus. The President’s act of going to the U.N. with it before coming to terms with Congress has also merited widespread dissent.

Mr. Obama has not been forthcoming with any explanation of his actions, and the White House press corps has not been particularly inquisitive.  It is, then, necessary to speculate on why the Administration has so substantially broken with the basics of a foreign policy that has prevented a major war since the end of World War 2, brought about unprecedented international prosperity, resulted in the downfall of the Soviet Union, and most importantly, kept America relatively secure from onslaught by other nations.

There are two most probable explanations.

The first is that the President, as a politician, may believe that the interests of his core constituency are different from those of his predecessors. As an example, his Administration, (which has done very little for Christians, who have been oppressed throughout the Islamic world and China and very little to oppose the anti-Semitic tenor at the United Nations) recently convened a significant U.N. Security Council hearing on gay rights.  While protecting LGBT’s is not outside the parameters of the American belief in individual rights, the fact that a greater emphasis has been placed on this issue than on protecting oppressed Christians and Jews is telling. The President may believe that his core constituency is simply uninterested in national security and traditional values, and has chosen what he believes to be a more politically rewarding path of ignoring those areas as substantially as possible, with the exception of “politically correct” issues such as LGBT rights.

The second possibility is substantially related to the first. The Obama Administration has obviously concentrated on an ambitious and expensive policy of “fundamentally transforming” the national character of the United States. That transformation is heavily dependent on costly government programs, including the 40% increase in food stamp enrollment, and the implementation of Obamacare.  The dollars have to come from somewhere, and raising taxes higher than they have already been hiked would be politically unpopular. Freeing up funds from defense spending, which currently accounts for less than one-fifth of the federal budget, can only be feasibly done if commitments abroad are downgraded and threats ignored. This appears to be the course the White House has chosen.

The problem, of course, is that while this may prove a politically expedient strategy to solidify the left-wing base of Democrat-inclined voters, it comes with an enormous burden. The very real challenge of Russian, Chinese, Iranian, terrorist, and North Korean belligerence can be ignored for only so long. Very real and very substantial threats will grow as America’s defense base continues to shrink from budget cuts and the loss of key personnel, and as allies drift away after viewing the U.S. as an unreliable partner.  When, as is inevitable, this reaches a crisis stage, the United States will have neither the defense capability nor the alliances necessary to respond successfully.

The Obama Administration is apparently gambling that this will occur after it leaves office.

Categories
Quick Analysis

New York Analysis on Obama’s Foreign Policy

President Obama’s foreign policy appears inexplicable.  Today, the New York Ingredients: Newly grown dehusked Black gram (powdered) – 25 gm Seeds of kapikacchu (mucuna pruriens) (powdered) – 25 gm Seeds of kapikacchu (mucuna pruriens) (powdered) – 25 gm Shatavari, ashwagandha, Madhuyashti [ Glycerrhiza Glabra. ] (Powdered)- 3 gm each Ghee (prepared from cow’s milk) – 10 gm buying cialis on line Juice of Vidari kanda (Pueraria tuberosais) – 10 gm Sugar cane juice – 10 gm Cow’s milk -. This jelly must be consumed 15 minutes before copulation &the impact of such drug products longs for about 4-6 hours after its administration. * One must remember that before generic cialis without prescription making any consideration of such medicinal devices, the patients must obtain proper information regarding the usage, route of mechanism, adverse responses associated with the drug treatments from their health professional.* He must not have an excess consumption of such medicinal. Once patients are found to be infected with uterine fibroid, and the fibroid is in non-surgical stage, then fuyan pill will be a good choice, it can help you relieve levitra prescription the symptom, control the growing-up of the fibroid. There are also dangers associated levitra in india price with these Stents. Analysis of Policy & Government provides the most logical explanation.

Categories
Quick Analysis

The Cyber Threat

Speaking at the 2015 USSTRATCOM Deterrence Symposium recently, Dr. Brad Roberts, who served as  Deputy Assistant Secretary of Defense for Nuclear and Missile Defense Policy in the first Obama Administration, stated that cyber warfare capability is a key operational concept.

The New York Analysis of Policy & Budget reported in 2013 that “America faces a number of cyberspace threats. The most serious are from those wishing to engage in espionage to steal both military and technological secrets, and from those who wish to turn the nation’s own computer systems against it by dismantling defense systems and committing sabotage against key civilian infrastructure. Cyber attacks have escalated by 1,700% since 2009, costing intellectual property theft losses over $400 billion.

An armed attack following a cyber assault would be exceptionally effective. Key defense systems could be disabled, leading to a military that is deaf, dumb, and blind, defending a nation that may have its electrical, energy, water, transportation and other crucial systems heavily disrupted.

General Keith Alexander, the former commander of the U.S. Cyber Command, openly worried that the United States was not adequately prepared for a cyber attack. He noted that on a scale of  one to ten in preparedness, the U.S. was at about a three. He emphasized that the time to stop a cyber attack is less than a minute–far less time than preparing for an incoming missile attack.”

The Fireeye organization ‘s report, “Gazing into the Cyber Security Future” notes that “As the technology landscape evolves and attackers continue to adapt, we’re going to see new vulnerabilities to mobile, new operating systems and the cloud—and new ways for attackers to exploit these weaknesses. Preventing every breach is impossible.”

James R. Clapper, the Director of National Intelligence, reviewed  the 2015 cyber threat environment:

“Cyber threats to US national and economic security are increasing in frequency, scale, sophistication, and severity of impact. The ranges of cyber threat actors, methods of attack, targeted systems, and victims are also expanding. Overall, the unclassified information and communication technology (ICT) networks that support US Government, military, commercial, and social activities remain vulnerable to espionage and/or disruption. However, the likelihood of a catastrophic attack from any particular actor is remote at this time. Rather than a “Cyber Armageddon” scenario that debilitates the entire US infrastructure, we envision something different. We foresee an ongoing series of low-to-moderate level cyber attacks from a variety of sources over time, which will impose cumulative costs on US economic competitiveness and national security.

  • A growing number of computer forensic studies by industry experts strongly suggest that several nations—including Iran and North Korea—have undertaken offensive cyber operations against private sector targets to support their economic and foreign policy objectives, at times concurrent with political crises.

Developed as a viable alternative to order cialis professional , this medicine also contains Sildenafil citrate. Take viagra for sale india no more than one tablet daily and let 24 hour period pass by before taking another one. Continue reading healthier facts to use Here, we are going to explore the most commonly found medical illness called erectile dysfunction. discount pfizer viagra The medicine is actively prescribed as the same aids in causing improvement in the blood circulation that helps in flushing of blood across all muscles and primarily the penile muscles so as to provide harder erection during the intercourse. cheapest price on tadalafil
Risk. Despite ever-improving network defenses, the diverse possibilities for remote hacking intrusions, supply chain operations to insert compromised hardware or software, and malevolent activities by human insiders will hold nearly all ICT systems at risk for years to come. In short, the cyber threat cannot be eliminated; rather, cyber risk must be managed. Moreover, the risk calculus employed by some private sector entities does not adequately account for foreign cyber threats or the systemic interdependencies between different critical infrastructure sectors.

Costs. During 2014, we saw an increase in the scale and scope of reporting on malevolent cyber activity that can be measured by the amount of corporate data stolen or deleted, personally identifiable information (PII) compromised, or remediation costs incurred by US victims.

For example:

  • After the 2012-13 distributed denial of service (DDOS) attacks on the US financial sector, JPMorgan Chase (JPMorgan) announced plans for annual cyber security expenditures of $250 million by the end of 2014. After the company suffered a hacking intrusion in 2014, JPMorgan’s CEO said he would probably double JPMorgan’s annual computer security budget within the next five years.
  • The 2014 data breach at Home Depot exposed information from 56 million credit/debit cards and 53 million customer email addresses. Home Depot estimated the cost of the breach to be $62 million.
  • In 2014, unauthorized computer intrusions were detected on the networks of the Office of Personnel Management (OPM) as well as its contractors, US Investigations Services (USIS) and KeyPoint 2 Government Solutions. The two contractors were involved in processing sensitive PII related to national security clearances for Federal Government employees.
  • In August 2014, the US company, Community Health Systems, informed the Securities and Exchange Commission that it believed hackers “originating from China” had stolen PII on 4.5 million individuals.

Attribution. Although cyber operators can infiltrate or disrupt targeted ICT networks, most can no longer assume that their activities will remain undetected. Nor can they assume that if detected, they will be able to conceal their identities. Governmental and private sector security professionals have made significant advances in detecting and attributing cyber intrusions.

  • In May 2014, the US Department of Justice indicted five officers from China’s Peoples’ Liberation Army on charges of hacking US companies.
  • In December 2014, computer security experts reported that members of an Iranian organization were responsible for computer operations targeting US military, transportation, public utility, and other critical infrastructure networks.

Deterrence. Numerous actors remain undeterred from conducting economic cyber espionage or perpetrating cyber attacks. The absence of universally accepted and enforceable norms of behavior in cyberspace has contributed to this situation. The motivation to conduct cyber attacks and cyber espionage will probably remain strong because of the relative ease of these operations and the gains they bring to the perpetrators. The result is a cyber environment in which multiple actors continue to test their adversaries’ technical capabilities, political resolve, and thresholds. The muted response by most victims to cyber attacks has created a permissive environment in which low-level attacks can be used as a coercive tool short of war, with relatively low risk of retaliation. Additionally, even when a cyber attack can be attributed to a specific actor, the forensic attribution often requires a significant amount of time to complete. Long delays between the cyber attack and determination of attribution likewise reinforce a permissive environment.

Threat Actors:  Politically motivated cyber attacks are now a growing reality, and foreign actors are reconnoitering and developing access to US critical infrastructure systems, which might be quickly exploited for disruption if an adversary’s intent became hostile. In addition, those conducting cyber espionage are targeting US government, military, and commercial networks on a daily basis. These threats come from a range of actors, including: (1) nation states with highly sophisticated cyber programs (such as Russia or China), (2) nations with lesser technical capabilities but possibly more disruptive intent (such as Iran or North Korea), (3) profit-motivated criminals, and (4) ideologically motivated hackers or extremists. Distinguishing between state and non-state actors within the same country is often difficult—especially when those varied actors actively collaborate, tacitly cooperate, condone criminal activity that only harms foreign victims, or utilize similar cyber tools.

Russia. Russia’s Ministry of Defense is establishing its own cyber command, which—according to senior Russian military officials—will be responsible for conducting offensive cyber activities, including  propaganda operations and inserting malware into enemy command and control systems. Russia’s armed forces are also establishing a specialized branch for computer network operations.

  • Computer security studies assert that unspecified Russian cyber actors are developing means to access industrial control systems (ICS) remotely. These systems manage critical infrastructures such as electric power grids, urban mass-transit systems, air-traffic control, and oil and gas distribution networks. These unspecified Russian actors have successfully compromised the product supply chains of three ICS vendors so that customers download exploitative malware directly from the vendors’ websites along with routine software updates, according to private sector cyber security experts.

China. Chinese economic espionage against US companies remains a significant issue. The “advanced persistent threat” activities continue despite detailed private sector reports, public indictments, and US demarches, according to a computer security study. China is an advanced cyber actor; however, Chinese hackers often use less sophisticated cyber tools to access targets. Improved cyber defenses would require hackers to use more sophisticated skills and make China’s economic espionage more costly and difficult to conduct.

Iran. Iran very likely values its cyber program as one of many tools for carrying out asymmetric but proportional retaliation against political foes, as well as a sophisticated means of collecting intelligence. Iranian actors have been implicated in the 2012-13 DDOS attacks against US financial institutions and in the February 2014 cyber attack on the Las Vegas Sands casino company.

North Korea. North Korea is another state actor that uses its cyber capabilities for political objectives. The North Korean Government was responsible for the November 2014 cyber attack on Sony Pictures Entertainment (SPE), which stole corporate information and introduced hard drive erasing malware into the company’s network infrastructure, according to the FBI. The attack coincided with the planned release of a SPE feature film satire that depicted the planned assassination of the North Korean president.

Terrorists. Terrorist groups will continue to experiment with hacking, which could serve as the foundation for developing more advanced capabilities. Terrorist sympathizers will probably conduct low level cyber attacks on behalf of terrorist groups and attract attention of the media, which might exaggerate the capabilities and threat posed by these actors.

Integrity of Information

Most of the public discussion regarding cyber threats has focused on the confidentiality and availability of information; cyber espionage undermines confidentiality, whereas denial-of-service operations and data deletion attacks undermine availability. In the future, however, we might also see more cyber operations that will change or manipulate electronic information in order to compromise its integrity (i.e. accuracy and reliability) instead of deleting it or disrupting access to it. Decision making by senior government officials (civilian and military), corporate executives, investors, or others will be impaired if they cannot trust the information they are receiving.

  • Successful cyber operations targeting the integrity of information would need to overcome any institutionalized checks and balances designed to prevent the manipulation of data, for example, market monitoring and clearing functions in the financial sector.

Categories
Quick Analysis

Illegal immigration presents budget, crime, and health concerns

Illegal immigration is having a significant effect on the already weakened budgets of U.S. states and cities, as well as directly impacting the health and safety of the American population.

The sheer numbers are staggering. According to the Center for Immigration Studies,  the immigrant population, legal and illegal, hit a record 42.1 million in second quarter of 2015, driven largely by a surge in illegals coming across the southern border, “an increase of 1.7 million since the same quarter of 2014. Growth in the immigrant population in the last year was led by a 740,000 increase in the number of Mexican immigrants. After falling or growing little in recent years, the number of Mexican immigrants again seems to be growing significantly. Among the CIS findings:

  • The nation’s immigrant (foreign-born) population, which includes legal and illegal immigrants, grew by 4.1 million from the second quarter of 2011 to the second quarter of 2015 …Immigrants are 13.3 percent of the nation’s total population — the largest share in 105 years.

The side effects are known to doctors and the FDA, but robertrobb.com soft generic viagra still they are being prescribed and used by males of different age group. It can lessen some significant side-effects of aging, such as cognitive dysfunction, by protecting and repairing the brain drugshop here viagra samples cells. A problem some men have, price of viagra which may also be a sensitive issue for them is erectile dysfunction. Check supplies cipla cialis on hand, and the site’s delivery information.

  • Growth in the last year was led by a rebound in the number of Mexican immigrants, which increased by 740,000 from 2014 to 2015 — accounting for 44 percent of the increase in the total immigrant population in the last year.
  • The total Mexican immigrant population (legal and illegal) reached 12.1 million in the second quarter of 2015 — the highest quarterly total ever.
  • Prior research has indicated that net migration (the number coming vs. leaving) from Mexico had fallen to zero; the recent growth indicates that the period of zero net migration has ended.
  • In addition to Mexico, growth in the immigrant population was led by a 449,000 increase in the last year from countries in Latin America other than Mexico.
  • The Department of Homeland Security and other researchers have estimated that eight in 10 illegal immigrants are from Mexico and Latin America, so the increase in immigrants from these countries is an indication that illegal immigration has begun growing again.
  • The number of immigrants in the United States is now enormous, but it must be recognized that most immigrants, including those from Latin America, are in the country legally. Absent a change in legal immigration policy, the immigrant population will continue to increase.”

According to the Congressional Budget Office,

“State and local governments incur costs for providing services to unauthorized immigrants and have limited options for avoiding or minimizing those costs… Rules governing many federal programs, as well as decisions handed down by various courts, limit the authority of state and local governments to avoid or constrain the costs of providing services to unauthorized immigrants. For example, both state and federal courts have ruled that states may not refuse to provide free public education to a student on the basis of his or her immigration status. Furthermore, many states have their own statutory or constitutional requirements concerning the provision of certain services to needy residents…

“Costs were concentrated in programs that make up a large percentage of total state spending—specifically, those associated with education, health care, and law enforcement… The tax revenues that unauthorized immigrants generate for state and local governments do not offset the total cost of services provided to those immigrants.”

The Federation for American Immigration Reform “estimates the annual costs of illegal immigration at the federal, state and local level to be about $113 billion; nearly $29 billion at the federal level and $84 billion at the state and local level…tax collections from illegal alien workers, both those in the above-ground economy and those in the underground economy… do not come close to the level of expenditures and, in any case, are misleading as an offset because over time unemployed and underemployed U.S. workers would replace illegal alien workers…

“Education for the children of illegal aliens constitutes the single largest cost to taxpayers, at an annual price tag of nearly $52 billion. Nearly all of those costs are absorbed by state and local governments.

“At the federal level, about one-third of outlays are matched by tax collections from illegal aliens. At the state and local level, an average of less than 5 percent of the public costs associated with illegal immigration is recouped through taxes collected from illegal aliens.

“Most illegal aliens do not pay income taxes. Among those who do, much of the revenues collected are refunded to the illegal aliens when they file tax returns. Many are also claiming tax credits resulting in payments from the U.S. Treasury. With many state budgets in deficit, policymakers have an obligation to look for ways to reduce the fiscal burden of illegal migration. California, facing a budget deficit of $14.4 billion in 2010-2011, is hit with an estimated $21.8 billion in annual expenditures on illegal aliens. New York’s $6.8 billion deficit is smaller than its $9.5 billion in yearly illegal alien costs.”

Crime and public health, as well as budgets, have been directly affected by illegal immigration.

In FY 2013, the U.S. Immigration and Customs Enforcement Agency (ICE)

“conducted 133,551 removals of individuals apprehended in the interior of the U.S.; 82 percent of all interior removals had been previously convicted of a crime. 59 percent of all ICE removals, a total of 216,810, had been previously convicted of a crime. ICE apprehended and removed 110,115 criminals removed from the interior of the U.S. ICE removed 106,695 criminals apprehended at the border while attempting to unlawfully enter the U.S.”

Health concerns are also significant. Judicial Watch Reports that “illegal immigrant minors entering the U.S. are bringing serious diseases—including swine flu, dengue fever, possibly Ebola virus and tuberculosis—that present a danger to the American public as well as the Border Patrol agents forced to care for the kids, according to a U.S. Congressman who is also medical doctor.

“This has created a ‘severe and dangerous’ crisis, says the Georgia lawmaker, Phil Gingrey. Most of the Unaccompanied Alien Children (UAC) are coming from Central America and they’re importing infectious diseases considered to be largely eradicated in this country. Additionally, many of the migrants lack basic vaccinations such as those to prevent chicken pox or measles, leaving America’s young children and the elderly particularly susceptible…Specifically, tuberculosis has become a dangerous issue at both the border and the camps, according to several sources cited in the story. One source confirms that ‘the amount of tuberculosis is astonishing.”