Breaking News and Updates
- Abolition Of Work
- Alternative Medicine
- Artificial Intelligence
- Atlas Shrugged
- Ayn Rand
- Basic Income Guarantee
- Conscious Evolution
- Cosmic Heaven
- Designer Babies
- Ethical Egoism
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom of Speech
- Gene Medicine
- Genetic Engineering
- Germ Warfare
- Golden Rule
- Government Oppression
- High Seas
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Longevity
- Immortality Medicine
- Intentional Communities
- Life Extension
- Mars Colonization
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- New Utopia
- Personal Empowerment
- Political Correctness
- Politically Incorrect
- Post Human
- Post Humanism
- Private Islands
- Resource Based Economy
- Ron Paul
- Second Amendment
- Second Amendment
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Teilhard De Charden
- The Singularity
- Tor Browser
- Transhuman News
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Zeitgeist Movement
The Evolutionary Perspective
Tag Archives: vietnam
Posted: November 10, 2016 at 5:33 pm
The International Radiotelephony Spelling Alphabet, commonly known as the ICAO phonetic alphabet, sometimes called the NATO alphabet or spelling alphabet and the ITU radiotelephonic or phonetic alphabet, is the most widely used radiotelephonic spelling alphabet. Although often called “phonetic alphabets”, spelling alphabets are not associated with phonetic transcription systems such as the International Phonetic Alphabet. Instead, the International Civil Aviation Organization (ICAO) alphabet assigned codewords acrophonically to the letters of the English alphabet, so that critical combinations of letters and numbers can be pronounced and understood by those who exchange voice messages by radio or telephone regardless of language barriers or the quality of the communication channel.
The 26 code words in the NATO phonetic alphabet are assigned to the 26 letters of the English alphabet in alphabetical order as follows: Alfa, Bravo, Charlie, Delta, Echo, Foxtrot, Golf, Hotel, India, Juliett, Kilo, Lima, Mike, November, Oscar, Papa, Quebec, Romeo, Sierra, Tango, Uniform, Victor, Whiskey, X-ray, Yankee, Zulu.
After the phonetic alphabet was developed by the International Civil Aviation Organization (ICAO) (see history below) it was adopted by many other international and national organizations, including the North Atlantic Treaty Organization (NATO), the International Telecommunication Union (ITU), the International Maritime Organization (IMO), the American Federal Aviation Administration (FAA), the Alliance for Telecommunications Industry Solutions (ATIS), and the International Amateur Radio Union (IARU).
It is a subset of the much older International Code of Signals (INTERCO), which originally included visual signals by flags or flashing light, sound signals by whistle, siren, foghorn, or bell, as well as one, two, or three letter codes for many phrases. The same alphabetic code words are used by all agencies, but each agency chooses one of two different sets of numeric code words. NATO uses the regular English numeric words (Zero, One, with some alternative pronunciations), whereas the IMO provides for compound numeric words (Nadazero, Unaone, Bissotwo…). In practice these are used very rarely, as they frequently result in confusion between speakers of different languages.
An alternative name for the ICAO spelling alphabet, “NATO phonetic alphabet,” exists because it appears in Allied Tactical Publication ATP-1, Volume II: Allied Maritime Signal and Maneuvering Book used by all allied navies of NATO, which adopted a modified form of the International Code of Signals. Because the latter allows messages to be spelled via flags or Morse code, it naturally named the code words used to spell out messages by voice its “phonetic alphabet”. The name NATO phonetic alphabet became widespread because the signals used to facilitate the naval communications and tactics of NATO have become global. However, ATP-1 is marked NATO Confidential (or the lower NATO Restricted) so it is not available publicly. Nevertheless, a NATO unclassified version of the document is provided to foreign, even hostile, militaries, even though they are not allowed to make it available publicly. The spelling alphabet is now also defined in other unclassified international military documents. The NATO alphabet appeared in some United States Air Force Europe publications during the Cold War. A particular example was the Ramstein Air Base, Telephone Directory published between 1969 and 1973 (currently out of print). The American and NATO versions had differences and the translation was provided as a convenience. Differences included Alfa, Bravo and Able, Baker for the first two letters.
The ICAO developed this system in the 1950s in order to account for discrepancies that might arise in communications as a result of multiple alphabet naming systems coexisting in different places and organizations.
In the official version of the alphabet, the non-English spellings Alfa and Juliett are used. Alfa is spelled with an f as it is in most European languages because the English and French spelling alpha would not be pronounced properly by native speakers of some other languages who may not know that ph should be pronounced as f. Juliett is spelled with a tt for French speakers, because they may otherwise treat a single final t as silent. In some English versions of the alphabet, one or both of these may have their standard English spelling.
The final choice of code words for the letters of the alphabet and for the digits was made after hundreds of thousands of comprehension tests involving 31 nationalities. The qualifying feature was the likelihood of a code word being understood in the context of others. For example, football has a higher chance of being understood than foxtrot in isolation, but foxtrot is superior in extended communication.
The pronunciation of the code words varies according to the language habits of the speaker. To eliminate wide variations in pronunciation, recordings and posters illustrating the pronunciation desired by the ICAO are available. However, there are still differences in pronunciation between the ICAO and other agencies, and the ICAO has conflicting Roman-alphabet and IPA transcriptions. Also, although all codes for the letters of the alphabet are English words, they are not in general given English pronunciations. Assuming that the transcriptions are not intended to be precise, only 11 of the 26Bravo, Echo, Hotel, Juliet(t), Kilo, Mike, Papa, Quebec, Romeo, Whiskey, and Zuluare given English pronunciations by all these agencies, though not always the same English pronunciations.
Pronunciations are somewhat uncertain because the agencies, while ostensibly using the same pronunciations, give different transcriptions, which are often inconsistent from letter to letter. The ICAO gives different pronunciations in IPA transcription than in respelling, and the FAA also gives different pronunciations depending on the publication consulted, the FAA Aeronautical Information Manual (4-2-7), the FAA Flight Services manual (14.1.5), or the ATC manual (2-4-16). ATIS gives English spellings, but does not give pronunciations or numbers. The ICAO, NATO, and FAA use modifications of English numerals, with stress on one syllable, while the ITU and IMO compound pseudo-Latinate numerals with a slightly different set of modified English numerals, and with stress on each syllable. Numbers 1099 are spelled out (that is, 17 is “17” and 60 is “60”), while for hundreds and thousands the English words hundred and thousand are used.
The pronunciation of the digits 3, 4, 5, and 9 differs from standard English being pronounced tree, fower, fife, and niner. The digit 3 is specified as tree so that it is not pronounced sri; the long pronunciation of 4 (still found in some English dialects) keeps it somewhat distinct from for; 5 is pronounced with a second “f” because the normal pronunciation with a “v” is easily confused with “fire” (a command to shoot); and 9 has an extra syllable to keep it distinct from German nein ‘no’.
Only the ICAO prescribes pronunciation with the IPA, and then only for letters. Several of the pronunciations indicated are slightly modified from their normal English pronunciations: /lf, brvo, li, delt, fkstrt, lf, lim, sk, sier, tno, unifrm, vikt, jnki/, partially due to the substitution of final schwas with the ah vowel; in addition, the intended distinction between the short vowels /o / and the long vowels /o / is obscure, and has been ignored in the consolidated transcription above. Both the IPA and respelled pronunciations were developed by the ICAO before 1956 with advice from the governments of both the United States and United Kingdom, so the pronunciations of both General American English and British Received Pronunciation are evident, especially in the rhotic and non-rhotic accents. The respelled version is usually at least consistent with a rhotic accent (‘r’ pronounced), as in CHAR LEE, SHAR LEE, NO VEM BER, YOU NEE FORM, and OO NEE FORM, whereas the IPA version usually specifies a non-rhotic accent (‘r’ pronounced only before a vowel), as in tli, li, novemb, and junifm. Exceptions are OSS CAH, VIK TAH and unifrm. The IPA form of Golf implies it is pronounced gulf, which is not either General American English or British Received Pronunciation. Different agencies assign different stress patterns to Bravo, Hotel, Juliett, November, Papa, X-ray; the ICAO has different stresses for Bravo, Juliett, X-ray in its respelled and IPA transcriptions. The mid back  vowel transcribed in Oscar and Foxtrot is actually a low vowel in both Received British and General American, and has been interpreted as such above. Furthermore, the pronunciation prescribed for “whiskey” has no initial [h], although some speakers in both General American and RP pronounce an h here, and an initial [h] is categorical in Scotland and Ireland.
The first internationally recognized spelling alphabet was adopted by the ITU during 1927. The experience gained with that alphabet resulted in several changes being made during 1932 by the ITU. The resulting alphabet was adopted by the International Commission for Air Navigation, the predecessor of the ICAO, and was used for civil aviation until World War II. It continued to be used by the IMO until 1965:
Amsterdam, Baltimore, Casablanca, Denmark, Edison, Florida, Gallipoli, Havana, Italia, Jerusalem, Kilogramme, Liverpool, Madagascar, New York, Oslo, Paris, Quebec, Roma, Santiago, Tripoli, Upsala, Valencia, Washington, Xanthippe, Yokohama, Zurich
British and American armed forces had each developed their spelling alphabets before both forces adopted the ICAO alphabet during 1956. British forces adopted the RAF phonetic alphabet, which is similar to the phonetic alphabet used by the Royal Navy during World War I. At least two of the terms are sometimes still used by UK civilians to spell words over the phone, namely ‘F for Freddie’ and ‘S for Sugar’.
The U.S. adopted the Joint Army/Navy Phonetic Alphabet during 1941 to standardize systems among all branches of its armed forces. The U.S. alphabet became known as Able Baker after the words for A and B. The United Kingdom adapted its RAF alphabet during 1943 to be almost identical to the American Joint-Army-Navy (JAN) one.
After World War II, with many aircraft and ground personnel from the allied armed forces, “Able Baker” continued to be used for civil aviation. But many sounds were unique to English, so an alternative “Ana Brazil” alphabet was used in Latin America. But the International Air Transport Association (IATA), recognizing the need for a single universal alphabet, presented a draft alphabet to the ICAO during 1947 that had sounds common to English, French, Spanish and Portuguese. After further study and modification by each approving body, the revised alphabet was implemented on 1 November 1951 for civil aviation (but it may not have been adopted by any military):
Alfa, Bravo, Coca, Delta, Echo, Foxtrot, Golf, Hotel, India, Juliett, Kilo, Lima, Metro, Nectar, Oscar, Papa, Quebec, Romeo, Sierra, Tango, Union, Victor, Whisky, Extra, Yankee, Zulu
Problems were soon found with this list. Some users believed that they were so severe that they reverted to the old “Able Baker” alphabet. To identify the deficiencies of the new alphabet, testing was conducted among speakers from 31 nations, principally by the governments of the United Kingdom and the United States. Confusion among words like Delta, Nectar, Victor, and Extra, or the unintelligibility of other words during poor receiving conditions were the main problems. After much study, only the five words representing the letters C, M, N, U, and X were replaced. The ICAO sent a recording of the new Radiotelephony Spelling Alphabet to all member states in November 1955. The final version given in the table above was implemented by the ICAO on 1 March 1956, and the ITU adopted it no later than 1959 when they mandated its usage via their official publication, Radio Regulations. Because the ITU governs all international radio communications, it was also adopted by all radio operators, whether military, civilian, or amateur. It was finally adopted by the IMO in 1965. During 1947 the ITU adopted the compound number words (Nadazero Unaone, etc.), later adopted by the IMO during 1965.
A spelling alphabet is used to spell parts of a message containing letters and numbers to avoid confusion, because many letters sound similar, for instance “n” and “m” or “f” and “s”; the potential for confusion increases if static or other interference is present. For instance the message “proceed to map grid DH98” could be transmitted as “proceed to map grid Delta-Hotel-Niner-Ait”. Using “Delta” instead of “D” avoids confusion between “DH98” and “BH98” or “TH98”. The unusual pronunciation of certain numbers was designed to reduce confusion.
In addition to the traditional military usage, civilian industry uses the alphabet to avoid similar problems in the transmission of messages by telephone systems. For example, it is often used in the retail industry where customer or site details are spoken by telephone (to authorize a credit agreement or confirm stock codes), although ad hoc coding is often used in that instance. It has been used often by information technology workers to communicate serial/reference codes (which are often very long) or other specialised information by voice. Most major airlines use the alphabet to communicate Passenger Name Records (PNRs) internally, and in some cases, with customers. It is often used in a medical context as well, to avoid confusion when transmitting information.
Several letter codes and abbreviations using the spelling alphabet have become well-known, such as Bravo Zulu (letter code BZ) for “well done”,Checkpoint Charlie (Checkpoint C) in Berlin, and Zulu Time for Greenwich Mean Time or Coordinated Universal Time. During the Vietnam War, the The U.S. government referred to the Viet Cong guerrillas and the group itself as VC, or Victor Charlie; the name “Charlie” became synonymous with this force.
Adam, Boston, Chicago, Denver, Edward, Frank, George, Henry, Ida, John, King, Lincoln, Mary, New York, Ocean, Peter, Queen, Roger, Sugar, Thomas, Union, [Victor?], William, X-Ray, Young, Zero
Many unofficial spelling alphabets are in use that are not based on a standard, but are based on words the transmitter can remember easily, including first names, states, or cities. The LAPD phonetic alphabet has many first names. The German spelling alphabet (“Deutsches Funkalphabet” (literally “German Radio Alphabet”)) also uses first names. Also, during the Vietnam war, soldiers used ‘Cain’ instead of ‘Charlie’ because ‘Charlie’ meant Viet Cong (Charlie being short for Victor Charlie, the NATO alphabet spelling of the initials VC).
Certain languages’ standard alphabets have letters, or letters with diacritics (e.g., umlauts), that do not exist in the English alphabet. If these letters have two-letter ASCII substitutes, the ICAO/NATO code words for the two letters are used.
In Spanish the word “oo” is used for .
In German and Swedish, Alfa-Alfa (aa) is used for “”, Alfa-Echo (ae) for “”, Oscar-Echo (oe) for “”, Sierra-Sierra (ss) for “”, and Uniform-Echo (ue) for “”. Alternatively, Swedish may use ke, rlig and sten for the accented letters.
In Danish and Norwegian the letters “”, “” and “” have their own code words. In Danish gir, dis and se represent the three letters, while in Norwegian the three code words are gir, rnulf and got for civilians and rlig, sten and se for military personnel.
Czech “”, historically uo, is Uniform-Oscar (uo).
In Finnish there are special code words for the letters , and . ke is used to represent , iti is used for and ljy for . These code words are used only in national operations, the last remnants of the Finnish radio alphabet.
Estonian has 4 special letters, , , and . nne represents , rni for , bik for and lle for .
Malay replaces letter L with London”, since the word Lima in Malay means number 5 (five).
Read the original post:
NATO phonetic alphabet – Wikipedia
Posted: October 27, 2016 at 11:55 am
Censorship is the suppression of free speech, public communication or other information which may be considered objectionable, harmful, sensitive, politically incorrect or inconvenient as determined by governments, media outlets, authorities or other groups or institutions.
Governments, private organizations and individuals may engage in censorship. When an individual such as an author or other creator engages in censorship of their own works or speech, it is referred to as self-censorship. Censorship could be direct or indirect, in which case it is referred to as soft censorship. It occurs in a variety of different media, including speech, books, music, films, and other arts, the press, radio, television, and the Internet for a variety of claimed reasons including national security, to control obscenity, child pornography, and hate speech, to protect children or other vulnerable groups, to promote or restrict political or religious views, and to prevent slander and libel.
Direct censorship may or may not be legal, depending on the type, location, and content. Many countries provide strong protections against censorship by law, but none of these protections are absolute and frequently a claim of necessity to balance conflicting rights is made, in order to determine what could and could not be censored. There are no laws against self-censorship.
In 399 BC, Greek philosopher, Socrates, defied attempts by the Greek state to censor his philosophical teachings and was sentenced to death by drinking a poison, hemlock. Socrates’ student, Plato, is said to have advocated censorship in his essay on The Republic, which opposed the existence of democracy. In contrast to Plato, Greek playwright Euripides (480406BC) defended the true liberty of freeborn men, including the right to speak freely. In 1766, Sweden became the first country to abolish censorship by law.
The rationale for censorship is different for various types of information censored:
Strict censorship existed in the Eastern Bloc. Throughout the bloc, the various ministries of culture held a tight rein on their writers. Cultural products there reflected the propaganda needs of the state. Party-approved censors exercised strict control in the early years. In the Stalinist period, even the weather forecasts were changed if they had the temerity to suggest that the sun might not shine on May Day. Under Nicolae Ceauescu in Romania, weather reports were doctored so that the temperatures were not seen to rise above or fall below the levels which dictated that work must stop.
Independent journalism did not exist in the Soviet Union until Mikhail Gorbachev became its leader; all reporting was directed by the Communist Party or related organizations. Pravda, the predominant newspaper in the Soviet Union, had a monopoly. Foreign newspapers were available only if they were published by Communist Parties sympathetic to the Soviet Union.
Possession and use of copying machines was tightly controlled in order to hinder production and distribution of samizdat, illegal self-published books and magazines. Possession of even a single samizdat manuscript such as a book by Andrei Sinyavsky was a serious crime which might involve a visit from the KGB. Another outlet for works which did not find favor with the authorities was publishing abroad.
The People’s Republic of China employs sophisticated censorship mechanisms, referred to as the Golden Shield Project, to monitor the internet. Popular search engines such as Baidu also remove politically sensitive search results.
Iraq under Baathist Saddam Hussein had much the same techniques of press censorship as did Romania under Nicolae Ceauescu but with greater potential violence.
Cuban media is operated under the supervision of the Communist Party’s Department of Revolutionary Orientation, which “develops and coordinates propaganda strategies”. Connection to the Internet is restricted and censored.
Censorship also takes place in capitalist nations, such as Uruguay. In 1973, a military coup took power in Uruguay, and the State practiced censorship. For example, writer Eduardo Galeano was imprisoned and later was forced to flee. His book Open Veins of Latin America was banned by the right-wing military government, not only in Uruguay, but also in Chile and Argentina.
In the United States, censorship occurs through books, film festivals, politics, and public schools. See banned books for more information. Additionally, critics of campaign finance reform in the United States say this reform imposes widespread restrictions on political speech.
In the Republic of Singapore, Section 33 of the Films Act originally banned the making, distribution and exhibition of “party political films”, at pain of a fine not exceeding $100,000 or to imprisonment for a term not exceeding 2 years. The Act further defines a “party political film” as any film or video
In 2001, the short documentary called A Vision of Persistence on opposition politician J. B. Jeyaretnam was also banned for being a “party political film”. The makers of the documentary, all lecturers at the Ngee Ann Polytechnic, later submitted written apologies and withdrew the documentary from being screened at the 2001 Singapore International Film Festival in April, having been told they could be charged in court. Another short documentary called Singapore Rebel by Martyn See, which documented Singapore Democratic Party leader Dr Chee Soon Juan’s acts of civil disobedience, was banned from the 2005 Singapore International Film Festival on the same grounds and See is being investigated for possible violations of the Films Act.
This law, however, is often disregarded when such political films are made supporting the ruling People’s Action Party (PAP). Channel NewsAsia’s five-part documentary series on Singapore’s PAP ministers in 2005, for example, was not considered a party political film.
Exceptions are also made when political films are made concerning political parties of other nations. Films such as Michael Moore’s Fahrenheit 911 are thus allowed to screen regardless of the law.
Since March 2009, the Films Act has been amended to allow party political films as long as they were deemed factual and objective by a consultative committee. Some months later, this committee lifted the ban on Singapore Rebel.
In wartime, explicit censorship is carried out with the intent of preventing the release of information that might be useful to an enemy. Typically it involves keeping times or locations secret, or delaying the release of information (e.g., an operational objective) until it is of no possible use to enemy forces. The moral issues here are often seen as somewhat different, as the proponents of this form of censorship argues that release of tactical information usually presents a greater risk of casualties among one’s own forces and could possibly lead to loss of the overall conflict.
During World War I letters written by British soldiers would have to go through censorship. This consisted of officers going through letters with a black marker and crossing out anything which might compromise operational secrecy before the letter was sent. The World War II catchphrase “Loose lips sink ships” was used as a common justification to exercise official wartime censorship and encourage individual restraint when sharing potentially sensitive information.
An example of “sanitization” policies comes from the USSR under Joseph Stalin, where publicly used photographs were often altered to remove people whom Stalin had condemned to execution. Though past photographs may have been remembered or kept, this deliberate and systematic alteration to all of history in the public mind is seen as one of the central themes of Stalinism and totalitarianism.
Censorship is occasionally carried out to aid authorities or to protect an individual, as with some kidnappings when attention and media coverage of the victim can sometimes be seen as unhelpful.
Censorship by religion is a form of censorship where freedom of expression is controlled or limited using religious authority or on the basis of the teachings of the religion. This form of censorship has a long history and is practiced in many societies and by many religions. Examples include the Galileo affair, Edict of Compigne, the Index Librorum Prohibitorum (list of prohibited books) and the condemnation of Salman Rushdie’s novel The Satanic Verses by Iranian leader Ayatollah Ruhollah Khomeini. Images of the Islamic figure Muhammad are also regularly censored.
The content of school textbooks is often the issue of debate, since their target audience is young people, and the term “whitewashing” is the one commonly used to refer to removal of critical or conflicting events. The reporting of military atrocities in history is extremely controversial, as in the case of The Holocaust (or Holocaust denial), Bombing of Dresden, the Nanking Massacre as found with Japanese history textbook controversies, the Armenian Genocide, the Tiananmen Square protests of 1989, and the Winter Soldier Investigation of the Vietnam War.
In the context of secondary school education, the way facts and history are presented greatly influences the interpretation of contemporary thought, opinion and socialization. One argument for censoring the type of information disseminated is based on the inappropriate quality of such material for the young. The use of the “inappropriate” distinction is in itself controversial, as it changed heavily. A Ballantine Books version of the book Fahrenheit 451 which is the version used by most school classes contained approximately 75 separate edits, omissions, and changes from the original Bradbury manuscript.
In February 2006 a National Geographic cover was censored by the Nashravaran Journalistic Institute. The offending cover was about the subject of love and a picture of an embracing couple was hidden beneath a white sticker.
Copy approval is the right to read and amend an article, usually an interview, before publication. Many publications refuse to give copy approval but it is increasingly becoming common practice when dealing with publicity anxious celebrities. Picture approval is the right given to an individual to choose which photos will be published and which will not. Robert Redford is well known for insisting upon picture approval. Writer approval is when writers are chosen based on whether they will write flattering articles or not. Hollywood publicist Pat Kingsley is known for banning certain writers who wrote undesirably about one of her clients from interviewing any of her other clients.
There are many ways that censors exhibit creativity, but a specific variant is of concern in which censors rewrite texts, giving these texts secret co-authors.
According to a Pew Research Center and the Columbia Journalism Review survey, “About one-quarter of the local and national journalists say they have purposely avoided newsworthy stories, while nearly as many acknowledge they have softened the tone of stories to benefit the interests of their news organizations. Fully four-in-ten (41%) admit they have engaged in either or both of these practices.”
Book censorship can be enacted at the national or sub-national level, and can carry legal penalties for their infraction. Books may also be challenged at a local, community level. As a result, books can be removed from schools or libraries, although these bans do not extend outside of that area.
Aside from the usual justifications of pornography and obscenity, some films are censored due to changing racial attitudes or political correctness in order to avoid ethnic stereotyping and/or ethnic offense despite its historical or artistic value. One example is the still withdrawn “Censored Eleven” series of animated cartoons, which may have been innocent then, but are “incorrect” now.
Film censorship is carried out by various countries to differing degrees. For example, only 34 foreign films a year are approved for official distribution in China’s strictly controlled film market.
A 1980 Israeli law forbade banned artwork composed of its four colours, and Palestinians were arrested for displaying such artwork or even for carrying sliced melons with the same pattern.
Music censorship has been implemented by states, religions, educational systems, families, retailers and lobbying groups and in most cases they violate international conventions of human rights.
Censorship of maps is often employed for military purposes. For example, the technique was used in former East Germany, especially for the areas near the border to West Germany in order to make attempts of defection more difficult. Censorship of maps is also applied by Google Maps, where certain areas are grayed out or blacked or areas are purposely left outdated with old imagery.
Under subsection 48(3) and (4) of the Penang Islamic Religious Administration Enactment 2004, non-Muslims in Malaysia are penalized for using the following words, or to write or publish them, in any form, version or translation in any language or for use in any publicity material in any medium: “Allah”, “Firman Allah”, “Ulama”, “Hadith”, “Ibadah”, “Kaabah”, “Qadhi'”, “Illahi”, “Wahyu”, “Mubaligh”, “Syariah”, “Qiblat”, “Haji”, “Mufti”, “Rasul”, “Iman”, “Dakwah”, “Wali”, “Fatwa”, “Imam”, “Nabi”, “Sheikh”, “Khutbah”, “Tabligh”, “Akhirat”, “Azan”, “Al Quran”, “As Sunnah”, “Auliya'”, “Karamah”, “False Moon God”, “Syahadah”, “Baitullah”, “Musolla”, “Zakat Fitrah”, “Hajjah”, “Taqwa” and “Soleh”.
Publishers of the Spanish reference dictionary Real Acdemia Espaola received petitions to censor the entries “Jewishness”, “Gypsiness”, “black work” and “weak sex”, claiming that they are either offensive or non-PC.
One elementary school’s obscenity filter changed every reference to the word “tit” to “breast,” so when a child typed “U.S. Constitution” into the school computer, it changed it to Consbreastution.
British photographer and visual artist Graham Ovenden’s photos and paintings were ordered to be destroyed by a London’s magistrate court in 2015 for being “indecent” and their copies had been removed from the online Tate gallery.
Internet censorship is control or suppression of the publishing or accessing of information on the Internet. It may be carried out by governments or by private organizations either at the behest of government or on their own initiative. Individuals and organizations may engage in self-censorship on their own or due to intimidation and fear.
The issues associated with Internet censorship are similar to those for offline censorship of more traditional media. One difference is that national borders are more permeable online: residents of a country that bans certain information can find it on websites hosted outside the country. Thus censors must work to prevent access to information even though they lack physical or legal control over the websites themselves. This in turn requires the use of technical censorship methods that are unique to the Internet, such as site blocking and content filtering.
Unless the censor has total control over all Internet-connected computers, such as in North Korea or Cuba, total censorship of information is very difficult or impossible to achieve due to the underlying distributed technology of the Internet. Pseudonymity and data havens (such as Freenet) protect free speech using technologies that guarantee material cannot be removed and prevents the identification of authors. Technologically savvy users can often find ways to access blocked content. Nevertheless, blocking remains an effective means of limiting access to sensitive information for most users when censors, such as those in China, are able to devote significant resources to building and maintaining a comprehensive censorship system.
Views about the feasibility and effectiveness of Internet censorship have evolved in parallel with the development of the Internet and censorship technologies:
A BBC World Service poll of 27,973 adults in 26 countries, including 14,306 Internet users, was conducted between 30 November 2009 and 7 February 2010. The head of the polling organization felt, overall, that the poll showed that:
The poll found that nearly four in five (78%) Internet users felt that the Internet had brought them greater freedom, that most Internet users (53%) felt that “the internet should never be regulated by any level of government anywhere”, and almost four in five Internet users and non-users around the world felt that access to the Internet was a fundamental right (50% strongly agreed, 29% somewhat agreed, 9% somewhat disagreed, 6% strongly disagreed, and 6% gave no opinion).
The rising usage of social media in many nations has led to the emergence of citizens organizing protests through social media, sometimes called “Twitter Revolutions.” The most notable of these social media led protests were parts Arab Spring uprisings, starting in 2010. In response to the use of social media in these protests, the Tunisian government began a hack of Tunisian citizens’ Facebook accounts, and reports arose of accounts being deleted.
Automated systems can be used to censor social media posts, and therefore limit what citizens can say online. This most notably occurs in China, where social media posts are automatically censored depending on content. In 2013, Harvard political science professor Gary King led a study to determine what caused social media posts to be censored and found that posts mentioning the government were not more or less likely to be deleted if they were supportive or critical of the government. Posts mentioning collective action were more likely to be deleted than those that had not mentioned collective action. Currently, social media censorship appears primarily as a way to restrict Internet users’ ability to organize protests. For the Chinese government, seeing citizens unhappy with local governance is beneficial as state and national leaders can replace unpopular officials. King and his researchers were able to predict when certain officials would be removed based on the number of unfavorable social media posts.
Social media sites such as Facebook are known to censor posts containing things such as nudity and hate speech.
Since the early 1980s, advocates of video games have emphasized their use as an expressive medium, arguing for their protection under the laws governing freedom of speech and also as an educational tool. Detractors argue that video games are harmful and therefore should be subject to legislative oversight and restrictions. Many video games have certain elements removed or edited due to regional rating standards. For example, in the Japanese and PAL Versions of No More Heroes, blood splatter and gore is removed from the gameplay. Decapitation scenes are implied, but not shown. Scenes of missing body parts after having been cut off, are replaced with the same scene, but showing the body parts fully intact.
Surveillance and censorship are different. Surveillance can be performed without censorship, but it is harder to engage in censorship without some form of surveillance. And even when surveillance does not lead directly to censorship, the widespread knowledge or belief that a person, their computer, or their use of the Internet is under surveillance can lead to self-censorship.
Protection of sources is no longer just a matter of journalistic ethics; it increasingly also depends on the journalist’s computer skills and all journalists should equip themselves with a “digital survival kit” if they are exchanging sensitive information online or storing it on a computer or mobile phone. And individuals associated with high-profile rights organizations, dissident, protest, or reform groups are urged to take extra precautions to protect their online identities.
The former Soviet Union maintained a particularly extensive program of state-imposed censorship. The main organ for official censorship in the Soviet Union was the Chief Agency for Protection of Military and State Secrets generally known as the Glavlit, its Russian acronym. The Glavlit handled censorship matters arising from domestic writings of just about any kindeven beer and vodka labels. Glavlit censorship personnel were present in every large Soviet publishing house or newspaper; the agency employed some 70,000 censors to review information before it was disseminated by publishing houses, editorial offices, and broadcasting studios. No mass medium escaped Glavlit’s control. All press agencies and radio and television stations had Glavlit representatives on their editorial staffs.
Sometimes, public knowledge of the existence of a specific document is subtly suppressed, a situation resembling censorship. The authorities taking such action will justify it by declaring the work to be “subversive” or “inconvenient”. An example is Michel Foucault’s 1978 text Sexual Morality and the Law (later republished as The Danger of Child Sexuality), originally published as La loi de la pudeur [literally, “the law of decency”]. This work defends the decriminalization of statutory rape and the abolition of age of consent laws.
When a publisher comes under pressure to suppress a book, but has already entered into a contract with the author, they will sometimes effectively censor the book by deliberately ordering a small print run and making minimal, if any, attempts to publicize it. This practice became known in the early 2000s as privishing (private publishing).
Censorship has been criticized throughout history for being unfair and hindering progress. In a 1997 essay on Internet censorship, social commentator Michael Landier claims that censorship is counterproductive as it prevents the censored topic from being discussed. Landier expands his argument by claiming that those who impose censorship must consider what they censor to be true, as individuals believing themselves to be correct would welcome the opportunity to disprove those with opposing views.
Censorship is often used to impose moral values on society, as in the censorship of material considered obscene. English novelist E. M. Forster was a staunch opponent of censoring material on the grounds that it was obscene or immoral, raising the issue of moral subjectivity and the constant changing of moral values. When the novel Lady Chatterley’s Lover was put on trial in 1960, Forster wrote:
Lady Chatterleys Lover is a literary work of importance…I do not think that it could be held obscene, but am in a difficulty here, for the reason that I have never been able to follow the legal definition of obscenity. The law tells me that obscenity may deprave and corrupt, but as far as I know, it offers no definition of depravity or corruption.
Censorship by country collects information on censorship, Internet censorship, Freedom of the Press, Freedom of speech, and Human Rights by country and presents it in a sortable table, together with links to articles with more information. In addition to countries, the table includes information on former countries, disputed countries, political sub-units within countries, and regional organizations.
Read more here:
Censorship – Wikipedia
Posted: October 19, 2016 at 4:09 am
Not to be confused with NASA. National Security Agency
Seal of the National Security Agency
Flag of the National Security Agency
The National Security Agency (NSA) is an intelligence organization of the United States government, responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, a discipline known as signals intelligence (SIGINT). NSA is concurrently charged with protection of U.S. government communications and information systems against penetration and network warfare. Although many of NSA’s programs rely on “passive” electronic collection, the agency is authorized to accomplish its mission through active clandestine means, among which are physically bugging electronic systems and allegedly engaging in sabotage through subversive software. Moreover, NSA maintains physical presence in a large number of countries across the globe, where its Special Collection Service (SCS) inserts eavesdropping devices in difficult-to-reach places. SCS collection tactics allegedly encompass “close surveillance, burglary, wiretapping, breaking and entering”.
Unlike the Defense Intelligence Agency (DIA) and the Central Intelligence Agency (CIA), both of which specialize primarily in foreign human espionage, NSA does not unilaterally conduct human-source intelligence gathering, despite often being portrayed so in popular culture. Instead, NSA is entrusted with assistance to and coordination of SIGINT elements at other government organizations, which are prevented by law from engaging in such activities without the approval of the NSA via the Defense Secretary. As part of these streamlining responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which was created to facilitate cooperation between NSA and other U.S. military cryptanalysis components. Additionally, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.
Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become one of the largest U.S. intelligence organizations in terms of personnel and budget, operating as part of the Department of Defense and simultaneously reporting to the Director of National Intelligence.
NSA surveillance has been a matter of political controversy on several occasions, such as its spying on anti-Vietnam war leaders or economic espionage. In 2013, the extent of some of the NSA’s secret surveillance programs was revealed to the public by Edward Snowden. According to the leaked documents, the NSA intercepts the communications of over a billion people worldwide, many of whom are American citizens, and tracks the movement of hundreds of millions of people using cellphones. Internationally, research has pointed to the NSA’s ability to surveil the domestic Internet traffic of foreign countries through “boomerang routing”.
The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipher decryption unit was established as the Cable and Telegraph Section which was also known as the Cipher Bureau. It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war it was relocated in the army’s organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the navy’s cryptoanalysis functions in July 1918. World War I ended on November 11, 1918, and MI-8 moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley.
MI-8 also operated the so-called “Black Chamber”. The Black Chamber was located on East 37th Street in Manhattan. Its purpose was to crack the communications codes of foreign governments. Jointly supported by the State Department and the War Department, the chamber persuaded Western Union, the largest U.S. telegram company, to allow government officials to monitor private communications passing through the company’s wires.
Other “Black Chambers” were also found in Europe. They were established by the French and British governments to read the letters of targeted individuals, employing a variety of techniques to surreptitiously open, copy, and reseal correspondence before forwarding it to unsuspecting recipients.
Despite the American Black Chamber’s initial successes, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson, who defended his decision by stating: “Gentlemen do not read each other’s mail”.
During World War II, the Signal Security Agency (SSA) was created to intercept and decipher the communications of the Axis powers. When the war ended, the SSA was reorganized as the Army Security Agency (ASA), and it was placed under the leadership of the Director of Military Intelligence.
On May 20, 1949, all cryptologic activities were centralized under a national organization called the Armed Forces Security Agency (AFSA). This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff. The AFSA was tasked to direct Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units. However, the AFSA was unable to centralize communications intelligence and failed to coordinate with civilian agencies that shared its interests such as the Department of State, Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI). In December 1951, President Harry S. Truman ordered a panel to investigate how AFSA had failed to achieve its goals. The results of the investigation led to improvements and its redesignation as the National Security Agency.
The agency was formally established by Truman in a memorandum of October 24, 1952, that revised National Security Council Intelligence Directive (NSCID) 9. Since President Truman’s memo was a classified document, the existence of the NSA was not known to the public at that time. Due to its ultra-secrecy the U.S. intelligence community referred to the NSA as “No Such Agency”.
In the 1960s, the NSA played a key role in expanding America’s commitment to the Vietnam War by providing evidence of a North Vietnamese attack on the American destroyer USSMaddox during the Gulf of Tonkin incident.
A secret operation, code-named “MINARET”, was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as major civil rights leaders, including Martin Luther King, Jr., and prominent U.S. journalists and athletes who criticized the Vietnam War. However, the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was “disreputable if not outright illegal”.
In the aftermath of the Watergate scandal, a congressional hearing in 1975 led by Sen. Frank Church revealed that the NSA, in collaboration with Britain’s SIGINT intelligence agency Government Communications Headquarters (GCHQ), had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock. Following the resignation of President Richard Nixon, there were several investigations of suspected misuse of FBI, CIA and NSA facilities. Senator Frank Church uncovered previously unknown activity, such as a CIA plot (ordered by the administration of President John F. Kennedy) to assassinate Fidel Castro. The investigation also uncovered NSA’s wiretaps on targeted American citizens.
After the Church Committee hearings, the Foreign Intelligence Surveillance Act of 1978 was passed into law. This was designed to limit the practice of mass surveillance in the United States.
In 1986, the NSA intercepted the communications of the Libyan government during the immediate aftermath of the Berlin discotheque bombing. The White House asserted that the NSA interception had provided “irrefutable” evidence that Libya was behind the bombing, which U.S. President Ronald Reagan cited as a justification for the 1986 United States bombing of Libya.
In 1999, a multi-year investigation by the European Parliament highlighted the NSA’s role in economic espionage in a report entitled ‘Development of Surveillance Technology and Risk of Abuse of Economic Information’. That year, the NSA founded the NSA Hall of Honor, a memorial at the National Cryptologic Museum in Fort Meade, Maryland. The memorial is a, “tribute to the pioneers and heroes who have made significant and long-lasting contributions to American cryptology”. NSA employees must be retired for more than fifteen years to qualify for the memorial.
NSA’s infrastructure deteriorated in the 1990s as defense budget cuts resulted in maintenance deferrals. On January 24, 2000, NSA headquarters suffered a total network outage for three days caused by an overloaded network. Incoming traffic was successfully stored on agency servers, but it could not be directed and processed. The agency carried out emergency repairs at a cost of $3 million to get the system running again. (Some incoming traffic was also directed instead to Britain’s GCHQ for the time being.) Director Michael Hayden called the outage a “wake-up call” for the need to invest in the agency’s infrastructure.
In the aftermath of the September 11 attacks, the NSA created new IT systems to deal with the flood of information from new technologies like the Internet and cellphones. ThinThread contained advanced data mining capabilities. It also had a “privacy mechanism”; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. ThinThread was cancelled when Michael Hayden chose Trailblazer, which did not include ThinThread’s privacy system.
Trailblazer Project ramped up in 2002. SAIC, Boeing, CSC, IBM, and Litton worked on it. Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and the NSA and DoD Inspectors General. The project was cancelled in early 2004; it was late, over budget, and didn’t do what it was supposed to do. The government then raided the whistleblowers’ houses. One of them, Thomas Drake, was charged with violating 18 U.S.C.793(e) in 2010 in an unusual use of espionage law. He and his defenders claim that he was actually being persecuted for challenging the Trailblazer Project. In 2011, all ten original charges against Drake were dropped.
Turbulence started in 2005. It was developed in small, inexpensive “test” pieces, rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer. It was to be a realization of information processing at higher speeds in cyberspace.
The massive extent of the NSA’s spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. Most of the disclosures were leaked by former NSA contractor, Edward Snowden.
It was revealed that the NSA intercepts telephone and Internet communications of over a billion people worldwide, seeking information on terrorism as well as foreign politics, economics and “commercial secrets”. In a declassified document it was revealed that 17,835 phone lines were on an improperly permitted “alert list” from 2006 to 2009 in breach of compliance, which tagged these phone lines for daily monitoring. Eleven percent of these monitored phone lines met the agency’s legal standard for “reasonably articulable suspicion” (RAS).
A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East. The NSA has also spied extensively on the European Union, the United Nations and numerous governments including allies and trading partners in Europe, South America and Asia.
The NSA tracks the locations of hundreds of millions of cellphones per day, allowing them to map people’s movements and relationships in detail. It reportedly has access to all communications made via Google, Microsoft, Facebook, Yahoo, YouTube, AOL, Skype, Apple and Paltalk, and collects hundreds of millions of contact lists from personal email and instant messaging accounts each year. It has also managed to weaken much of the encryption used on the Internet (by collaborating with, coercing or otherwise infiltrating numerous technology companies), so that the majority of Internet privacy is now vulnerable to the NSA and other attackers.
Domestically, the NSA collects and stores metadata records of phone calls, including over 120 million US Verizon subscribers, as well as Internet communications, relying on a secret interpretation of the Patriot Act whereby the entirety of US communications may be considered “relevant” to a terrorism investigation if it is expected that even a tiny minority may relate to terrorism. The NSA supplies foreign intercepts to the DEA, IRS and other law enforcement agencies, who use these to initiate criminal investigations. Federal agents are then instructed to “recreate” the investigative trail via parallel construction.
The NSA also spies on influential Muslims to obtain information that could be used to discredit them, such as their use of pornography. The targets, both domestic and abroad, are not suspected of any crime but hold religious or political views deemed “radical” by the NSA.
Although NSAs surveillance activities are controversial, government agencies and private enterprises have common needs, and sometimes cooperate at subtle and complex technical levels. Big data is becoming more advantageous, justifying the cost of required computer hardware, and social media lead the trend. The interests of NSA and Silicon Valley began to converge as advances in computer storage technology drastically reduced the costs of storing enormous amounts of data and at the same time the value of the data for use in consumer marketing began to rise. On the other hand, social media sites are growing as voluntary data mining operations on a scale that rivals or exceeds anything the government could attempt on its own.
According to a report in The Washington Post in July 2014, relying on information provided by Snowden, 90% of those placed under surveillance in the U.S. are ordinary Americans, and are not the intended targets. The newspaper said it had examined documents including emails, text messages, and online accounts that support the claim.
Despite President Obama’s claims that these programs have congressional oversight, members of Congress were unaware of the existence of these NSA programs or the secret interpretation of the Patriot Act, and have consistently been denied access to basic information about them. Obama has also claimed that there are legal checks in place to prevent inappropriate access of data and that there have been no examples of abuse; however, the secret FISC court charged with regulating the NSA’s activities is, according to its chief judge, incapable of investigating or verifying how often the NSA breaks even its own secret rules. It has since been reported that the NSA violated its own rules on data access thousands of times a year, many of these violations involving large-scale data interceptions; and that NSA officers have even used data intercepts to spy on love interests. The NSA has “generally disregarded the special rules for disseminating United States person information” by illegally sharing its intercepts with other law enforcement agencies. A March 2009 opinion of the FISC court, released by court order, states that protocols restricting data queries had been “so frequently and systemically violated that it can be fairly said that this critical element of the overall … regime has never functioned effectively.” In 2011 the same court noted that the “volume and nature” of the NSA’s bulk foreign Internet intercepts was “fundamentally different from what the court had been led to believe”. Email contact lists (including those of US citizens) are collected at numerous foreign locations to work around the illegality of doing so on US soil.
Legal opinions on the NSA’s bulk collection program have differed. In mid-December 2013, U.S. District Court Judge Richard Leon ruled that the “almost-Orwellian” program likely violates the Constitution, and wrote, “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval. Surely, such a program infringes on ‘that degree of privacy’ that the Founders enshrined in the Fourth Amendment. Indeed, I have little doubt that the author of our Constitution, James Madison, who cautioned us to beware ‘the abridgement of freedom of the people by gradual and silent encroachments by those in power,’ would be aghast.”
Later that month, U.S. District Judge William Pauley ruled that the NSA’s collection of telephone records is legal and valuable in the fight against terrorism. In his opinion, he wrote, “a bulk telephony metadata collection program [is] a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data” and noted that a similar collection of data prior to 9/11 might have prevented the attack.
An October 2014 United Nations report condemned mass surveillance by the United States and other countries as violating multiple international treaties and conventions that guarantee core privacy rights.
On March 20, 2013 the Director of National Intelligence, Lieutenant General James Clapper, testified before Congress that the NSA does not wittingly collect any kind of data on millions or hundreds of millions of Americans, but he retracted this in June after details of the PRISM program were published, and stated instead that meta-data of phone and Internet traffic are collected, but no actual message contents. This was corroborated by the NSA Director, General Keith Alexander, before it was revealed that the XKeyscore program collects the contents of millions of emails from US citizens without warrant, as well as “nearly everything a user does on the Internet”. Alexander later admitted that “content” is collected, but stated that it is simply stored and never analyzed or searched unless there is “a nexus to al-Qaida or other terrorist groups”.
Regarding the necessity of these NSA programs, Alexander stated on June 27 that the NSA’s bulk phone and Internet intercepts had been instrumental in preventing 54 terrorist “events”, including 13 in the US, and in all but one of these cases had provided the initial tip to “unravel the threat stream”. On July 31 NSA Deputy Director John Inglis conceded to the Senate that these intercepts had not been vital in stopping any terrorist attacks, but were “close” to vital in identifying and convicting four San Diego men for sending US$8,930 to Al-Shabaab, a militia that conducts terrorism in Somalia.
The U.S. government has aggressively sought to dismiss and challenge Fourth Amendment cases raised against it, and has granted retroactive immunity to ISPs and telecoms participating in domestic surveillance. The U.S. military has acknowledged blocking access to parts of The Guardian website for thousands of defense personnel across the country, and blocking the entire Guardian website for personnel stationed throughout Afghanistan, the Middle East, and South Asia.
The NSA is led by the Director of the National Security Agency (DIRNSA), who also serves as Chief of the Central Security Service (CHCSS) and Commander of the United States Cyber Command (USCYBERCOM) and is the highest-ranking military official of these organizations. He is assisted by a Deputy Director, who is the highest-ranking civilian within the NSA/CSS.
NSA also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC).
Unlike other intelligence organizations such as CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure.
As of the mid-1990s, the National Security Agency was organized into five Directorates:
Each of these directorates consisted of several groups or elements, designated by a letter. There were for example the A Group, which was responsible for all SIGINT operations against the Soviet Union and Eastern Europe, and G Group, which was responsible for SIGINT related to all non-communist countries. These groups were divided in units designated by an additional number, like unit A5 for breaking Soviet codes, and G6, being the office for the Middle East, North Africa, Cuba, Central and South America.
As of 2013[update], NSA has about a dozen directorates, which are designated by a letter, although not all of them are publicly known. The directorates are divided in divisions and units starting with the letter of the parent directorate, followed by a number for the division, the sub-unit or a sub-sub-unit.
The main elements of the organizational structure of the NSA are:
In the year 2000, a leadership team was formed, consisting of the Director, the Deputy Director and the Directors of the Signals Intelligence (SID), the Information Assurance (IAD) and the Technical Directorate (TD). The chiefs of other main NSA divisions became associate directors of the senior leadership team.
After president George W. Bush initiated the President’s Surveillance Program (PSP) in 2001, the NSA created a 24-hour Metadata Analysis Center (MAC), followed in 2004 by the Advanced Analysis Division (AAD), with the mission of analyzing content, Internet metadata and telephone metadata. Both units were part of the Signals Intelligence Directorate.
A 2016 proposal would combine the Signals Intelligence Directorate with the Information Assurance Directorate into a Directorate of Operations.
The NSA maintains at least two watch centers:
The number of NSA employees is officially classified but there are several sources providing estimates. In 1961, NSA had 59,000 military and civilian employees, which grew to 93,067 in 1969, of which 19,300 worked at the headquarters at Fort Meade. In the early 1980s NSA had roughly 50,000 military and civilian personnel. By 1989 this number had grown again to 75,000, of which 25,000 worked at the NSA headquarters. Between 1990 and 1995 the NSA’s budget and workforce were cut by one third, which led to a substantial loss of experience.
In 2012, the NSA said more than 30,000 employees worked at Fort Meade and other facilities. In 2012, John C. Inglis, the deputy director, said that the total number of NSA employees is “somewhere between 37,000 and one billion” as a joke, and stated that the agency is “probably the biggest employer of introverts.” In 2013 Der Spiegel stated that the NSA had 40,000 employees. More widely, it has been described as the world’s largest single employer of mathematicians. Some NSA employees form part of the workforce of the National Reconnaissance Office (NRO), the agency that provides the NSA with satellite signals intelligence.
As of 2013 about 1,000 system administrators work for the NSA.
The NSA received criticism early on in 1960 after two agents had defected to the Soviet Union. Investigations by the House Un-American Activities Committee and a special subcommittee of the United States House Committee on Armed Services revealed severe cases of ignorance in personnel security regulations, prompting the former personnel director and the director of security to step down and leading to the adoption of stricter security practices. Nonetheless, security breaches reoccurred only a year later when in an issue of Izvestia of July 23, 1963, a former NSA employee published several cryptologic secrets.
The very same day, an NSA clerk-messenger committed suicide as ongoing investigations disclosed that he had sold secret information to the Soviets on a regular basis. The reluctance of Congressional houses to look into these affairs had prompted a journalist to write, “If a similar series of tragic blunders occurred in any ordinary agency of Government an aroused public would insist that those responsible be officially censured, demoted, or fired.” David Kahn criticized the NSA’s tactics of concealing its doings as smug and the Congress’ blind faith in the agency’s right-doing as shortsighted, and pointed out the necessity of surveillance by the Congress to prevent abuse of power.
Edward Snowden’s leaking of the existence of PRISM in 2013 caused the NSA to institute a “two-man rule”, where two system administrators are required to be present when one accesses certain sensitive information. Snowden claims he suggested such a rule in 2009.
The NSA conducts polygraph tests of employees. For new employees, the tests are meant to discover enemy spies who are applying to the NSA and to uncover any information that could make an applicant pliant to coercion. As part of the latter, historically EPQs or “embarrassing personal questions” about sexual behavior had been included in the NSA polygraph. The NSA also conducts five-year periodic reinvestigation polygraphs of employees, focusing on counterintelligence programs. In addition the NSA conducts periodic polygraph investigations in order to find spies and leakers; those who refuse to take them may receive “termination of employment”, according to a 1982 memorandum from the director of the NSA.
There are also “special access examination” polygraphs for employees who wish to work in highly sensitive areas, and those polygraphs cover counterintelligence questions and some questions about behavior. NSA’s brochure states that the average test length is between two and four hours. A 1983 report of the Office of Technology Assessment stated that “It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions.” Sometimes applicants in the polygraph process confess to committing felonies such as murder, rape, and selling of illegal drugs. Between 1974 and 1979, of the 20,511 job applicants who took polygraph tests, 695 (3.4%) confessed to previous felony crimes; almost all of those crimes had been undetected.
In 2010 the NSA produced a video explaining its polygraph process. The video, ten minutes long, is titled “The Truth About the Polygraph” and was posted to the Web site of the Defense Security Service. Jeff Stein of The Washington Post said that the video portrays “various applicants, or actors playing them it’s not clear describing everything bad they had heard about the test, the implication being that none of it is true.” AntiPolygraph.org argues that the NSA-produced video omits some information about the polygraph process; it produced a video responding to the NSA video. George Maschke, the founder of the Web site, accused the NSA polygraph video of being “Orwellian”.
After Edward Snowden revealed his identity in 2013, the NSA began requiring polygraphing of employees once per quarter.
The number of exemptions from legal requirements has been criticized. When in 1964 the Congress was hearing a bill giving the director of the NSA the power to fire at will any employee,The Washington Post wrote: “This is the very definition of arbitrariness. It means that an employee could be discharged and disgraced on the basis of anonymous allegations without the slightest opportunity to defend himself.” Yet, the bill was accepted by an overwhelming majority.
The heraldic insignia of NSA consists of an eagle inside a circle, grasping a key in its talons. The eagle represents the agency’s national mission. Its breast features a shield with bands of red and white, taken from the Great Seal of the United States and representing Congress. The key is taken from the emblem of Saint Peter and represents security.
When the NSA was created, the agency had no emblem and used that of the Department of Defense. The agency adopted its first of two emblems in 1963. The current NSA insignia has been in use since 1965, when then-Director, LTG Marshall S. Carter (USA) ordered the creation of a device to represent the agency.
The NSA’s flag consists of the agency’s seal on a light blue background.
Crews associated with NSA missions have been involved in a number of dangerous and deadly situations. The USS Liberty incident in 1967 and USS Pueblo incident in 1968 are examples of the losses endured during the Cold War.
The National Security Agency/Central Security Service Cryptologic Memorial honors and remembers the fallen personnel, both military and civilian, of these intelligence missions. It is made of black granite, and has 171 names carved into it, as of 2013[update] . It is located at NSA headquarters. A tradition of declassifying the stories of the fallen was begun in 2001.
NSANet stands for National Security Agency Network and is the official NSA intranet. It is a classified network, for information up to the level of TS/SCI to support the use and sharing of intelligence data between NSA and the signals intelligence agencies of the four other nations of the Five Eyes partnership. The management of NSANet has been delegated to the Central Security Service Texas (CSSTEXAS).
NSANet is a highly secured computer network consisting of fiber-optic and satellite communication channels which are almost completely separated from the public Internet. The network allows NSA personnel and civilian and military intelligence analysts anywhere in the world to have access to the agency’s systems and databases. This access is tightly controlled and monitored. For example, every keystroke is logged, activities are audited at random and downloading and printing of documents from NSANet are recorded.
In 1998, NSANet, along with NIPRNET and SIPRNET, had “significant problems with poor search capabilities, unorganized data and old information”. In 2004, the network was reported to have used over twenty commercial off-the-shelf operating systems. Some universities that do highly sensitive research are allowed to connect to it.
The thousands of Top Secret internal NSA documents that were taken by Edward Snowden in 2013 were stored in “a file-sharing location on the NSA’s intranet site” so they could easily be read online by NSA personnel. Everyone with a TS/SCI-clearance had access to these documents and as a system administrator, Snowden was responsible for moving accidentally misplaced highly sensitive documents to more secure storage locations.
The DoD Computer Security Center was founded in 1981 and renamed the National Computer Security Center (NCSC) in 1985. NCSC was responsible for computer security throughout the federal government. NCSC was part of NSA, and during the late 1980s and the 1990s, NSA and NCSC published Trusted Computer System Evaluation Criteria in a six-foot high Rainbow Series of books that detailed trusted computing and network platform specifications. The Rainbow books were replaced by the Common Criteria, however, in the early 2000s.
On July 18, 2013, Greenwald said that Snowden held “detailed blueprints of how the NSA does what they do”, thereby sparking fresh controversy.
Headquarters for the National Security Agency is located at 39632N 764617W / 39.10889N 76.77139W / 39.10889; -76.77139 in Fort George G. Meade, Maryland, although it is separate from other compounds and agencies that are based within this same military installation. Ft. Meade is about 20mi (32km) southwest of Baltimore, and 25mi (40km) northeast of Washington, DC. The NSA has its own exit off Maryland Route 295 South labeled “NSA Employees Only”. The exit may only be used by people with the proper clearances, and security vehicles parked along the road guard the entrance.
NSA is the largest employer in the U.S. state of Maryland, and two-thirds of its personnel work at Ft. Meade. Built on 350 acres (140ha; 0.55sqmi) of Ft. Meade’s 5,000 acres (2,000ha; 7.8sqmi), the site has 1,300 buildings and an estimated 18,000 parking spaces.
The main NSA headquarters and operations building is what James Bamford, author of Body of Secrets, describes as “a modern boxy structure” that appears similar to “any stylish office building.” The building is covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds. It contains 3,000,000 square feet (280,000m2), or more than 68 acres (28ha), of floor space; Bamford said that the U.S. Capitol “could easily fit inside it four times over.”
The facility has over 100 watchposts, one of them being the visitor control center, a two-story area that serves as the entrance. At the entrance, a white pentagonal structure, visitor badges are issued to visitors and security clearances of employees are checked. The visitor center includes a painting of the NSA seal.
The OPS2A building, the tallest building in the NSA complex and the location of much of the agency’s operations directorate, is accessible from the visitor center. Bamford described it as a “dark glass Rubik’s Cube”. The facility’s “red corridor” houses non-security operations such as concessions and the drug store. The name refers to the “red badge” which is worn by someone without a security clearance. The NSA headquarters includes a cafeteria, a credit union, ticket counters for airlines and entertainment, a barbershop, and a bank. NSA headquarters has its own post office, fire department, and police force.
The employees at the NSA headquarters reside in various places in the Baltimore-Washington area, including Annapolis, Baltimore, and Columbia in Maryland and the District of Columbia, including the Georgetown community.
Following a major power outage in 2000, in 2003 and in follow-ups through 2007, The Baltimore Sun reported that the NSA was at risk of electrical overload because of insufficient internal electrical infrastructure at Fort Meade to support the amount of equipment being installed. This problem was apparently recognized in the 1990s but not made a priority, and “now the agency’s ability to keep its operations going is threatened.”
Baltimore Gas & Electric (BGE, now Constellation Energy) provided NSA with 65 to 75 megawatts at Ft. Meade in 2007, and expected that an increase of 10 to 15 megawatts would be needed later that year. In 2011, NSA at Ft. Meade was Maryland’s largest consumer of power. In 2007, as BGE’s largest customer, NSA bought as much electricity as Annapolis, the capital city of Maryland.
One estimate put the potential for power consumption by the new Utah Data Center at US$40million per year.
When the agency was established, its headquarters and cryptographic center were in the Naval Security Station in Washington, D.C. The COMINT functions were located in Arlington Hall in Northern Virginia, which served as the headquarters of the U.S. Army’s cryptographic operations. Because the Soviet Union had detonated a nuclear bomb and because the facilities were crowded, the federal government wanted to move several agencies, including the AFSA/NSA. A planning committee considered Fort Knox, but Fort Meade, Maryland, was ultimately chosen as NSA headquarters because it was far enough away from Washington, D.C. in case of a nuclear strike and was close enough so its employees would not have to move their families.
Construction of additional buildings began after the agency occupied buildings at Ft. Meade in the late 1950s, which they soon outgrew. In 1963 the new headquarters building, nine stories tall, opened. NSA workers referred to the building as the “Headquarters Building” and since the NSA management occupied the top floor, workers used “Ninth Floor” to refer to their leaders. COMSEC remained in Washington, D.C., until its new building was completed in 1968. In September 1986, the Operations 2A and 2B buildings, both copper-shielded to prevent eavesdropping, opened with a dedication by President Ronald Reagan. The four NSA buildings became known as the “Big Four.” The NSA director moved to 2B when it opened.
On March 30, 2015, shortly before 9am, a stolen sports utility vehicle approached an NSA police vehicle blocking the road near the gate of Fort Meade, after it was told to leave the area. NSA officers fired on the SUV, killing the 27-year-old driver, Ricky Hall (a transgender person also known as Mya), and seriously injuring his 20-year-old male passenger. An NSA officer’s arm was injured when Hall subsequently crashed into his vehicle.
The two, dressed in women’s clothing after a night of partying at a motel with the man they’d stolen the SUV from that morning, “attempted to drive a vehicle into the National Security Agency portion of the installation without authorization”, according to an NSA statement. FBI spokeswoman Amy Thoreson said the incident is not believed to be related to terrorism. In June 2015 the FBI closed its investigation into the incident and federal prosecutors have declined to bring charges against anyone involved.
An anonymous police official told The Washington Post, “This was not a deliberate attempt to breach the security of NSA. This was not a planned attack.” The two are believed to have made a wrong turn off the highway, while fleeing from the motel after stealing the vehicle. A small amount of cocaine was found in the SUV. A local CBS reporter initially said a gun was found, but her later revision does not. Dozens of journalists were corralled into a parking lot blocks away from the scene, and were barred from photographing the area.
In 1995, The Baltimore Sun reported that the NSA is the owner of the single largest group of supercomputers.
NSA held a groundbreaking ceremony at Ft. Meade in May 2013 for its High Performance Computing Center 2, expected to open in 2016. Called Site M, the center has a 150 megawatt power substation, 14 administrative buildings and 10 parking garages. It cost $3.2billion and covers 227 acres (92ha; 0.355sqmi). The center is 1,800,000 square feet (17ha; 0.065sqmi) and initially uses 60 megawatts of electricity.
Increments II and III are expected to be completed by 2030, and would quadruple the space, covering 5,800,000 square feet (54ha; 0.21sqmi) with 60 buildings and 40 parking garages.Defense contractors are also establishing or expanding cybersecurity facilities near the NSA and around the Washington metropolitan area.
As of 2012, NSA collected intelligence from four geostationary satellites. Satellite receivers were at Roaring Creek Station in Catawissa, Pennsylvania and Salt Creek Station in Arbuckle, California. It operated ten to twenty taps on U.S. telecom switches. NSA had installations in several U.S. states and from them observed intercepts from Europe, the Middle East, North Africa, Latin America, and Asia.
NSA had facilities at Friendship Annex (FANX) in Linthicum, Maryland, which is a 20 to 25-minute drive from Ft. Meade; the Aerospace Data Facility at Buckley Air Force Base in Aurora outside Denver, Colorado; NSA Texas in the Texas Cryptology Center at Lackland Air Force Base in San Antonio, Texas; NSA Georgia at Fort Gordon in Augusta, Georgia; NSA Hawaii in Honolulu; the Multiprogram Research Facility in Oak Ridge, Tennessee, and elsewhere.
On January 6, 2011 a groundbreaking ceremony was held to begin construction on NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, known as the “Utah Data Center” for short. The $1.5B data center is being built at Camp Williams, Utah, located 25 miles (40km) south of Salt Lake City, and will help support the agency’s National Cyber-security Initiative. It is expected to be operational by September 2013.
In 2009, to protect its assets and to access more electricity, NSA sought to decentralize and expand its existing facilities in Ft. Meade and Menwith Hill, the latter expansion expected to be completed by 2015.
The Yakima Herald-Republic cited Bamford, saying that many of NSA’s bases for its Echelon program were a legacy system, using outdated, 1990s technology. In 2004, NSA closed its operations at Bad Aibling Station (Field Station 81) in Bad Aibling, Germany. In 2012, NSA began to move some of its operations at Yakima Research Station, Yakima Training Center, in Washington state to Colorado, planning to leave Yakima closed. As of 2013, NSA also intended to close operations at Sugar Grove, West Virginia.
Following the signing in 19461956 of the UKUSA Agreement between the United States, United Kingdom, Canada, Australia and New Zealand, who then cooperated on signals intelligence and ECHELON, NSA stations were built at GCHQ Bude in Morwenstow, United Kingdom; Geraldton, Pine Gap and Shoal Bay, Australia; Leitrim and Ottawa, Canada; Misawa, Japan; and Waihopai and Tangimoana, New Zealand.
NSA operates RAF Menwith Hill in North Yorkshire, United Kingdom, which was, according to BBC News in 2007, the largest electronic monitoring station in the world. Planned in 1954, and opened in 1960, the base covered 562 acres (227ha; 0.878sqmi) in 1999.
The agency’s European Cryptologic Center (ECC), with 240 employees in 2011, is headquartered at a US military compound in Griesheim, near Frankfurt in Germany. A 2011 NSA report indicates that the ECC is responsible for the “largest analysis and productivity in Europe” and focusses on various priorities, including Africa, Europe, the Middle East and counterterrorism operations.
In 2013, a new Consolidated Intelligence Center, also to be used by NSA, is being built at the headquarters of the United States Army Europe in Wiesbaden, Germany. NSA’s partnership with Bundesnachrichtendienst (BND), the German foreign intelligence service, was confirmed by BND president Gerhard Schindler.
Thailand is a “3rd party partner” of the NSA along with nine other nations. These are non-English-speaking countries that have made security agreements for the exchange of SIGINT raw material and end product reports.
Thailand is the site of at least two US SIGINT collection stations. One is at the US Embassy in Bangkok, a joint NSA-CIA Special Collection Service (SCS) unit. It presumably eavesdrops on foreign embassies, governmental communications, and other targets of opportunity.
Read the original post:
National Security Agency – Wikipedia
Posted: August 21, 2016 at 11:17 am
Company / Job Title Location Date Leap29 Electrical Manager – Offshore Wind Farm Zwijndrecht, Belgium June 27, 2016 T & NB STAFFING INTERNATIONAL Offshore Utility Worker / Catering GULF OF MEXICO , US July 26, 2016 ARCHELONS Consulting Drilling Supervisor – offshore 10002 , Kuwait July 26, 2016 ARCHELONS Consulting Drilling Engineer – Offshore 10002 , Kuwait July 26, 2016 Worldwide Recruitment Solutions Steward Vlissingen, Netherlands July 22, 2016 XstremeMD Remote Offshore Paramedic LA, US August 10, 2016 PROJECT CONTROL MANAGER Doha , Qatar August 14, 2016 Lofton Energy Services Offshore Well Test Operators LA, US June 15, 2016 Advance Global Recruitment Limited Offshore Installation Manager (Marine CoC) Abu Dhabi , United Arab Emirates May 29, 2016 Transocean Senior HSE Advisor TX, US August 2, 2016 Spencer Ogden Rope Access 6G Welder / NDT Tech LA, US August 1, 2016 Oceaneering Shop Foreman, Service, Technology, & Rentals-Decommissioning LA, US June 24, 2016 MPH Global Head, Project Engineering (Tops/Manif/Umbil) Qatar , Qatar August 4, 2016 Fircroft Maintenance Mechanical Supervisor Malaysia, Malaysia August 15, 2016 Fircroft Discipline Engineer (Electrical&Instrumentation) Atyrau August 15, 2016 INPEX Operations Australia Pty Ltd Offshore Hook Up Manager WA, Australia August 19, 2016 International Development Company Head of Engineering Core Team Qatar August 3, 2016 Amine Operator – Gulf of Mexico Gulf of Mexico , US August 1, 2016 G.A.S Unlimited Commissioning Manager – Offshore TX, US August 8, 2016 Leap29 QHSE Engineer – Offshore Wind Project Zwijndrecht, Belgium June 24, 2016 Grand Isle Shipyard SCADA TECH Port Fourchon , US July 25, 2016 Fircroft Welder Hartlepool , United Kingdom July 1, 2016 Teekay Offshore Production HSEQ & Compliance Lead Rio de Janeiro , Brazil July 29, 2016 BW Offshore Operations Control Room Operator United Kingdom , United Kingdom August 16, 2016 Ably Resources Barge Engineer – Jack Up Saudi Arabia , Saudi Arabia June 13, 2016 Spencer Ogden 2nd Assistant Engineer TX, US August 17, 2016 Spencer Ogden QMED/Motorman TX, US August 17, 2016 NES Global Talent Mechanical Technician Scotland, United Kingdom August 19, 2016 Sofomation Senior Contracts Engineer Doha , Qatar August 6, 2016 International Development Company FEED Manager Qatar , Qatar August 7, 2016 Fircroft Project Instrument Engineer Norwich August 1, 2016 MPH Global Sr. Process Engineer Qatar , Qatar August 4, 2016 BW Offshore Marine Control Room Operator United Kingdom , United Kingdom August 16, 2016 Head Structural Engineering Doha , Qatar August 2, 2016 BW Offshore Senior Operations Technician United Kingdom , United Kingdom August 19, 2016 Fircroft start up engineer Aberdeen-Offshore August 1, 2016 Worldwide Recruitment Solutions Principal Electrical Engineer Saudi Arabia, Saudi Arabia August 4, 2016 International Development Company Risk Coordinator Qatar August 3, 2016 Fircroft Onshore Material Controller Baku August 1, 2016 Trainor Asia Ltd Chief Officer offshore vietnam , Vietnam July 11, 2016 Offshore Instrumentation & Electrical Technician GOM , US July 13, 2016 Teekay Offshore Production Supply Chain Lead – Brazil Rio de Janeiro , Brazil July 29, 2016 SOS HR Solutions Rigger Abu Dhabi , United Arab Emirates June 26, 2016 Amec Foster Wheeler Workpack Coordinator Aberdeen, United Kingdom August 19, 2016 BW Offshore Operations Technician United Kingdom , United Kingdom August 19, 2016 Raeburn Recruitment Senior Project Engineer (Safety and Utility Systems) Aberdeen, United Kingdom August 18, 2016 Complete Logistical Services, LLC Electricians LA, US June 17, 2016 Complete Logistical Services, LLC Senior Subsea Engineer Louisiana, United States , US June 17, 2016 Oceaneering Inspector I TX, US June 17, 2016 Oceaneering Inspector II TX, US June 17, 2016
Posted: June 19, 2016 at 3:49 am
A liberal, in the American sense, is one who falls to the left in the political spectrum; In other parts of the world, however, liberalism is the belief in laissez-faire capitalism and free-market systems – hence the recently coined term, neoliberalism.
Although I do not like to generalize, for the purposes of a (somewhat) concise dictionary definition, here is the very basic liberal (American sense) ideology:
Politics: The federal government exists to protect and serve the people, and therefore, should be given sufficient power to fulfill its role successfully. Ways in which this can be accomplished include giving the federal government more power than local governments and having the government provide programs designed to protect the interests of the people (these include welfare, Medicare, and social security). Overall, these programs have helped extensively in aiding the poor and unfortunate, as well as the elderly and middle class. To make sure that the interests of the people are served, it was liberals (or so they were considered in their time) that devised the idea of a direct democracy, a republic, and modern democracy. This way, it is ensured that the federal government represents the interests of the people, and the extensive power that it is given is not used to further unpopular goals. Liberals do not concentrate on military power (though that is not to say they ignore it), but rather focus on funding towards education, improving wages, protecting the environment, etc. Many propose the dismantling of heavy-cost programs such as the Star Wars program (no, not the film series), in order to use the money to fund more practical needs.
Social Ideology: As one travels further left on the political spectrum, it is noticed that tolerance, acceptance, and general compassion for all people steadily increases (in theory at least). Liberals are typically concerned with the rights of the oppressed and unfortunate this, of course, does not mean that they ignore the rights of others (liberals represent the best interests of the middle-class in America). This has led many liberals to lobby for the rights of homosexuals, women, minorities, single-mothers, etc. Many fundamentalists see this is immoral; however, it is, in reality, the most mature, and progressive way in which to deal with social differences. Liberals are identified with fighting for equal rights, such as those who wanted to abolish slavery and those who fought hard for a woman’s reproductive right (see Abortion). Liberals have also often fought for ecological integrity, protecting the environment, diversity of species, as well as indigenous populations rights. Almost all social betterment programs are funded by liberal institutions, and government funded social programs on education improvement, childrens rights, womens rights, etc. are all supported by liberals. Basically, social liberalism is the mature, understanding way in which to embrace individual differences, not according to ancient dogma or religious prejudice, but according to the ideals of humanity that have been cultivated by our experiences throughout history, summed up in that famous American maxim: with liberty and justice for all.
Economics: Using the term liberal when speaking of economics is very confusing, as liberal in America is completely opposite to the rest of the world. Therefore, here, as I have been doing, I will concentrate on the American definition of liberal concerning economics. Liberals believe that the rights of the people, of the majority, are to be valued much more sincerely than those of corporations, and therefore have frequently proposed the weakening of corporate power through heavier taxation (of corporations), environmental regulations, and the formation of unions. Liberals often propose the heavier taxation of WEALTHY individuals, while alleviating taxes on the middle class, and especially the poor. Liberals (American sense) do not support laissez-faire economics because, to put it simply, multinational corporations take advantage of developing countries and encourage exploitation and child labor (multinational corporations are spawned from laissez-faire policies). Instead, many propose the nationalization of several industries, which would make sure that wealth and power is not concentrated in a few hands, but is in the hands of the people (represented by elected officials in government). I am not going to go into the extreme intricacies of the economic implications of privatization of resources, etc., but will say that privatization and globalization have greatly damaged the economies of Latin America, namely Argentina and Mexico (see NAFTA).
This summation of the leftist ideology may not be 100% correct in all situations, as there are many variations on several issues and I may have depicted the current definition of liberal as too far to the left than it is generally accepted. On that note, many leftists are critical of the political situation in America, claiming that the left is now in the center, as the general populace has been conditioned by institutions such as Fox News to consider everything left of Hitler (as one clever person put it) as radical liberalism. I, myself, have observed that, in America, there are two basic types of liberals: those who concern themselves only with liberal policies on the domestic front, and either ignore international affairs or remain patriotic and dedicated to the American way (Al Franken, Bill Clinton, etc.) And then there are those, despite the criticism they face from many fellow liberals (classified under the former definition), who are highly critical of US foreign policy, addressing such issues as Iran-Contra, the Sandanistas, Pinochet, Vietnam, NATOs intervention in Kosovo, our trade embargo on Cuba, etc, etc. (such as Noam Chomsky, William Blumm, etc.) Unfortunately, it seems that adolescent rage has run rampant on this particular word, and most definitions are either incoherent jumbles of insults and generalizations or deliberate spewing of misinformation (see the definition that describes the situation in Iraq, without addressing our suppression of popular revolts in Iraq, our pre-war sanctions on Iraq that have caused the death of some 5 million children, and our support for Saddam during the Iran-Iraq war, and even our post-war sale of biological elements usable in weapons to Saddams regime).
Read more from the original source:
Posted: June 17, 2016 at 5:04 am
“The War on Drugs” is an American term commonly applied to a campaign of prohibition of drugs, military aid, and military intervention, with the stated aim being to reduce the illegal drug trade. This initiative includes a set of drug policies that are intended to discourage the production, distribution, and consumption of psychoactive drugs that the participating governments and the UN have made illegal. The term was popularized by the media shortly after a press conference given on June 18, 1971, by United States President Richard Nixonthe day after publication of a special message from President Nixon to the Congress on Drug Abuse Prevention and Controlduring which he declared drug abuse “public enemy number one”. That message to the Congress included text about devoting more federal resources to the “prevention of new addicts, and the rehabilitation of those who are addicted”, but that part did not receive the same public attention as the term “war on drugs”. However, two years even prior to this, Nixon had formally declared a “war on drugs” that would be directed toward eradication, interdiction, and incarceration. Today, the Drug Policy Alliance, which advocates for an end to the War on Drugs, estimates that the United States spends $51 billion annually on these initiatives.
On May 13, 2009, Gil Kerlikowskethe Director of the Office of National Drug Control Policy (ONDCP)signaled that the Obama administration did not plan to significantly alter drug enforcement policy, but also that the administration would not use the term “War on Drugs”, because Kerlikowske considers the term to be “counter-productive”. ONDCP’s view is that “drug addiction is a disease that can be successfully prevented and treated… making drugs more available will make it harder to keep our communities healthy and safe”. One of the alternatives that Kerlikowske has showcased is the drug policy of Sweden, which seeks to balance public health concerns with opposition to drug legalization. The prevalence rates for cocaine use in Sweden are barely one-fifth of those in Spain, the biggest consumer of the drug.
In June 2011, a self-appointed Global Commission on Drug Policy released a critical report on the War on Drugs, declaring: “The global war on drugs has failed, with devastating consequences for individuals and societies around the world. Fifty years after the initiation of the UN Single Convention on Narcotic Drugs, and years after President Nixon launched the US government’s war on drugs, fundamental reforms in national and global drug control policies are urgently needed.” The report was criticized by organizations that oppose a general legalization of drugs.
The first U.S. law that restricted the distribution and use of certain drugs was the Harrison Narcotics Tax Act of 1914. The first local laws came as early as 1860.
In 1919, the United States passed the 18th Amendment, prohibiting the sale, manufacture, and transportation of alcohol, with exceptions for religious and medical use.
In 1920, the United States passed the National Prohibition Act (Volstead Act), enacted to carry out the provisions in law of the 18th Amendment.
The Federal Bureau of Narcotics was established in the United States Department of the Treasury by an act of June 14, 1930 (46 Stat. 585).
In 1933, the federal prohibition for alcohol was repealed by passage of the 21st Amendment.
In 1935, President Franklin D. Roosevelt publicly supported the adoption of the Uniform State Narcotic Drug Act. The New York Times used the headline “Roosevelt Asks Narcotic War Aid”.
In 1937, the Marijuana Transfer Tax Act was passed. Several scholars have claimed that the goal was to destroy the hemp industry, largely as an effort of businessmen Andrew Mellon, Randolph Hearst, and the Du Pont family. These scholars argue that with the invention of the decorticator, hemp became a very cheap substitute for the paper pulp that was used in the newspaper industry. These scholars believe that Hearst felt[dubious discuss] that this was a threat to his extensive timber holdings. Mellon, United States Secretary of the Treasury and the wealthiest man in America, had invested heavily in the DuPont’s new synthetic fiber, nylon, and considered[dubious discuss] its success to depend on its replacement of the traditional resource, hemp. However, there were circumstances that contradict these claims. One reason for doubts about those claims is that the new decorticators did not perform fully satisfactorily in commercial production. To produce fiber from hemp was a labor-intensive process if you include harvest, transport and processing. Technological developments decreased the labor with hemp but not sufficient to eliminate this disadvantage.
The Nixon campaign in 1968, and the Nixon White House after that, had two enemies: the antiwar left and black people. You understand what Im saying? We knew we couldnt make it illegal to be either against the war or black, but by getting the public to associate the hippies with marijuana and blacks with heroin, and then criminalizing both heavily, we could disrupt those communities. We could arrest their leaders, raid their homes, break up their meetings, and vilify them night after night on the evening news. Did we know we were lying about the drugs? Of course we did.
Although Nixon declared “drug abuse” to be public enemy number one in 1971, the policies that his administration implemented as part of the Comprehensive Drug Abuse Prevention and Control Act of 1970 were a continuation of drug prohibition policies in the U.S., which started in 1914.
The Nixon Administration also repealed the federal 210-year mandatory minimum sentences for possession of marijuana and started federal demand reduction programs and drug-treatment programs. Robert DuPont, the “Drug czar” in the Nixon Administration, stated it would be more accurate to say that Nixon ended, rather than launched, the “war on drugs”. DuPont also argued that it was the proponents of drug legalization that popularized the term “war on drugs”.[unreliable source?]
On October 27, 1970, Congress passes the Comprehensive Drug Abuse Prevention and Control Act of 1970, which, among other things, categorizes controlled substances based on their medicinal use and potential for addiction.
In 1971, two congressmen released an explosive report on the growing heroin epidemic among U.S. servicemen in Vietnam; ten to fifteen percent of the servicemen were addicted to heroin, and President Nixon declared drug abuse to be “public enemy number one”.
In 1973, the Drug Enforcement Administration was created to replace the Bureau of Narcotics and Dangerous Drugs.
In 1982, Vice President George H. W. Bush and his aides began pushing for the involvement of the CIA and U.S. military in drug interdiction efforts.
The Office of National Drug Control Policy (ONDCP) was originally established by the National Narcotics Leadership Act of 1988, which mandated a national anti-drug media campaign for youth, which would later become the National Youth Anti-Drug Media Campaign. The director of ONDCP is commonly known as the Drug czar, and it was first implemented in 1989 under President George H. W. Bush, and raised to cabinet-level status by Bill Clinton in 1993. These activities were subsequently funded by t
he Treasury and General Government Appropriations Act of 1998. The Drug-Free Media Campaign Act of 1998 codified the campaign at 21 U.S.C.1708.
The Global Commission on Drug Policy released a report on June 2, 2011 alleging that “The War On Drugs Has Failed”. The commissioned was made up of 22 self-appointed members including a number of prominent international politicians and writers. U.S. Surgeon General Regina Benjamin also released the first ever National Prevention Strategy.
On May 21, 2012, the U.S. Government published an updated version of its Drug Policy. The director of ONDCP stated simultaneously that this policy is something different from the “War on Drugs”:
At the same meeting was a declaration signed by the representatives of Italy, the Russian Federation, Sweden, the United Kingdom and the United States in line with this: “Our approach must be a balanced one, combining effective enforcement to restrict the supply of drugs, with efforts to reduce demand and build recovery; supporting people to live a life free of addiction”.
According to Human Rights Watch, the War on Drugs caused soaring arrest rates which deliberately disproportionately targeted African Americans. This was also confirmed by John Ehrlichman, an aide to Nixon, who said that the war on drugs was designed to criminalize and disrupt black and hippie communities.
The present state of incarceration in the U.S. as a result of the war on drugs arrived in several stages. By 1971, different stops on drugs had been implemented for more than 50 years (for e.g. since 1914, 1937 etc.) with only a very small increase of inmates per 100,000 citizens. During the first 9 years after Nixon coined the expression “War on Drugs”, statistics showed only a minor increase in the total number of imprisoned.
After 1980, the situation began to change. In the 1980s, while the number of arrests for all crimes had risen by 28%, the number of arrests for drug offenses rose 126%. The US Department of Justice, reporting on the effects of state initiatives, has stated that, from 1990 through 2000, “the increasing number of drug offenses accounted for 27% of the total growth among black inmates, 7% of the total growth among Hispanic inmates, and 15% of the growth among white inmates.” In addition to prison or jail, the United States provides for the deportation of many non-citizens convicted of drug offenses.
In 1994, the New England Journal of Medicine reported that the “War on Drugs” resulted in the incarceration of one million Americans each year.
In 2008, the Washington Post reported that of 1.5 million Americans arrested each year for drug offenses, half a million would be incarcerated. In addition, one in five black Americans would spend time behind bars due to drug laws.
Federal and state policies also impose collateral consequences on those convicted of drug offenses, such as denial of public benefits or licenses, that are not applicable to those convicted of other types of crime.
In 1986, the U.S. Congress passed laws that created a 100 to 1 sentencing disparity for the possession or trafficking of crack when compared to penalties for trafficking of powder cocaine, which had been widely criticized as discriminatory against minorities, mostly blacks, who were more likely to use crack than powder cocaine. This 100:1 ratio had been required under federal law since 1986. Persons convicted in federal court of possession of 5grams of crack cocaine received a minimum mandatory sentence of 5 years in federal prison. On the other hand, possession of 500grams of powder cocaine carries the same sentence. In 2010, the Fair Sentencing Act cut the sentencing disparity to 18:1.
According to Human Rights Watch, crime statistics show thatin the United States in 1999compared to non-minorities, African Americans were far more likely to be arrested for drug crimes, and received much stiffer penalties and sentences.
Statistics from 1998 show that there were wide racial disparities in arrests, prosecutions, sentencing and deaths. African-American drug users made up for 35% of drug arrests, 55% of convictions, and 74% of people sent to prison for drug possession crimes. Nationwide African-Americans were sent to state prisons for drug offenses 13 times more often than other races, even though they only supposedly comprised 13% of regular drug users.
Anti-drug legislation over time has also displayed an apparent racial bias. University of Minnesota Professor and social justice author Michael Tonry writes, “The War on Drugs foreseeably and unnecessarily blighted the lives of hundreds and thousands of young disadvantaged black Americans and undermined decades of effort to improve the life chances of members of the urban black underclass.”
In 1968, President Lyndon B. Johnson decided that the government needed to make an effort to curtail the social unrest that blanketed the country at the time. He decided to focus his efforts on illegal drug use, an approach which was in line with expert opinion on the subject at the time. In the 1960s, it was believed that at least half of the crime in the U.S. was drug related, and this number grew as high as 90 percent in the next decade. He created the Reorganization Plan of 1968 which merged the Bureau of Narcotics and the Bureau of Drug Abuse to form the Bureau of Narcotics and Dangerous Drugs within the Department of Justice. The belief during this time about drug use was summarized by journalist Max Lerner in his celebrated work America as a Civilization (1957):
As a case in point we may take the known fact of the prevalence of reefer and dope addiction in Negro areas. This is essentially explained in terms of poverty, slum living, and broken families, yet it would be easy to show the lack of drug addiction among other ethnic groups where the same conditions apply.
Richard Nixon became president in 1969, and did not back away from the anti-drug precedent set by Johnson. Nixon began orchestrating drug raids nationwide to improve his “watchdog” reputation. Lois B. Defleur, a social historian who studied drug arrests during this period in Chicago, stated that, “police administrators indicated they were making the kind of arrests the public wanted”. Additionally, some of Nixon’s newly created drug enforcement agencies would resort to illegal practices to make arrests as they tried to meet public demand for arrest numbers. From 1972 to 1973, the Office of Drug Abuse and Law Enforcement performed 6,000 drug arrests in 18 months, the majority of the arrested black.
The next two Presidents, Gerald Ford and Jimmy Carter, responded with programs that were essentially a continuation of their predecessors. Shortly after Ronald Reagan became President in 1981 he delivered a speech on the topic. Reagan announced, “We’re taking down the surrender flag that has flown over so many drug efforts; we’re running up a battle flag.” For his first five years in office, Reagan slowly strengthened drug enforcement by creating mandatory minimum sentencing and forfeiture of cash and real estate for drug offenses, policies far more detrimental to poor blacks than any other sector affected by the new laws.
Then, driven by the 1986 cocaine overdose of black basketball star Len Bias,[dubious discuss] Reagan was able to pass the Anti-Drug Abuse Act through Congress. This legislation appropriated an additional $1.7 billion to fund th
e War on Drugs. More importantly, it established 29 new, mandatory minimum sentences for drug offenses. In the entire history of the country up until that point, the legal system had only seen 55 minimum sentences in total. A major stipulation of the new sentencing rules included different mandatory minimums for powder and crack cocaine. At the time of the bill, there was public debate as to the difference in potency and effect of powder cocaine, generally used by whites, and crack cocaine, generally used by blacks, with many believing that “crack” was substantially more powerful and addictive. Crack and powder cocaine are closely related chemicals, crack being a smokeable, freebase form of powdered cocaine hydrochloride which produces a shorter, more intense high while using less of the drug. This method is more cost effective, and therefore more prevalent on the inner-city streets, while powder cocaine remains more popular in white suburbia. The Reagan administration began shoring public opinion against “crack”, encouraging DEA official Robert Putnam to play up the harmful effects of the drug. Stories of “crack whores” and “crack babies” became commonplace; by 1986, Time had declared “crack” the issue of the year. Riding the wave of public fervor, Reagan established much harsher sentencing for crack cocaine, handing down stiffer felony penalties for much smaller amounts of the drug.
Reagan protg and former Vice-President George H. W. Bush was next to occupy the oval office, and the drug policy under his watch held true to his political background. Bush maintained the hard line drawn by his predecessor and former boss, increasing narcotics regulation when the First National Drug Control Strategy was issued by the Office of National Drug Control in 1989.
The next three presidents Clinton, Bush and Obama continued this trend, maintaining the War on Drugs as they inherited it upon taking office. During this time of passivity by the federal government, it was the states that initiated controversial legislation in the War on Drugs. Racial bias manifested itself in the states through such controversial policies as the “stop and frisk” police practices in New York city and the “three strikes” felony laws began in California in 1994.
In August 2010, President Obama signed the Fair Sentencing Act into law that dramatically reduced the 100-to-1 sentencing disparity between powder and crack cocaine, which disproportionately affected minorities.
A substantial part of the “Drug War” is the “Mexican Drug War.” Many drugs are transported from Mexico into the United States, such as cocaine, marijuana, methamphetamine, and heroin.
The possession of cocaine is illegal in all fifty states, along with crack cocaine (the cheaper version of cocaine but has a much greater penalty). Having possession is when the accused knowingly has it on their person, or in a backpack or purse. The possession of cocaine with no prior conviction, for the first offense, the person will be sentenced to a maximum of one year in prison or fined $1,000, or both. If the person has a prior conviction, whether it is a narcotic or cocaine, they will be sentenced to two years in “prison”, $2,500 fine. or both. With two or more convictions of possession prior to this present offense, they can be sentenced to 90 days in “prison” along with a $5,000 fine.
Marijuana is the most popular illegal drug worldwide. The punishment for possession of it is less than for the possession of cocaine or heroin. In some states in the US the drug is legal. Over 80 million of Americans have tried this type of drug. The Criminal Defense Lawyer article claims that, depending on the age of person and how much the person has been caught for possession, they will be fined and could plea bargain into going to a treatment program versus going to “prison”. In each state the convictions differ along with how much of the “marijuana” they have on their person.
Crystal meth is composed of methamphetamine hydrochloride. It is marketed as either a white powder or in a solid (rock) form. The possession of crystal meth can result in a punishment varying from a fine to a jail sentence. When the convict possessed a lot[clarification needed] of meth on their person, the sentence will be longer.
Heroin is an opiate that is highly addictive. If caught selling or possessing heroin, a perpetrator can be charged with a felony and face twofour years in prison and could be fined to a maximum of $20,000.
Some scholars have claimed that the phrase “War on Drugs” is propaganda cloaking an extension of earlier military or paramilitary operations. Others have argued that large amounts of “drug war” foreign aid money, training, and equipment actually goes to fighting leftist insurgencies and is often provided to groups who themselves are involved in large-scale narco-trafficking, such as corrupt members of the Colombian military.
From 1963 to the end of the Vietnam War in 1975, marijuana usage became common among U.S. soldiers in non-combat situations. Some servicemen also used heroin. Many of the servicemen ended the heroin use after returning to the United States but came home addicted. In 1971, the U.S. military conducted a study of drug use among American servicemen and women. It found that daily usage rates for drugs on a worldwide basis were as low as two percent. However, in the spring of 1971, two congressmen released an alarming report alleging that 15% of the servicemen in Vietnam were addicted to heroin. Marijuana use was also common in Vietnam. Soldiers who used drugs had more disciplinary problems. The frequent drug use had become an issue for the commanders in Vietnam; in 1971 it was estimated that 30,000 servicemen were addicted to drugs, most of them to heroin.
From 1971 on, therefore, returning servicemen were required to take a mandatory heroin test. Servicemen who tested positive upon returning from Vietnam were not allowed to return home until they had passed the test with a negative result. The program also offered a treatment for heroin addicts.
Elliot Borin’s article “The U.S. Military Needs its Speed”published in Wired on February 10, 2003reports:
But the Defense Department, which distributed millions of amphetamine tablets to troops during World War II, Vietnam and the Gulf War, soldiers on, insisting that they are not only harmless but beneficial.
In a news conference held in connection with Schmidt and Umbach’s Article 32 hearing, Dr. Pete Demitry, an Air Force physician and a pilot, claimed that the “Air Force has used (Dexedrine) safely for 60 years” with “no known speed-related mishaps.”
The need for speed, Demitry added “is a life-and-death issue for our military.”
One of the first anti-drug efforts in the realm of foreign policy was President Nixon’s Operation Intercept, announced in September 1969, targeted at reducing the amount of cannabis entering the United States from Mexico. The effort began with an intense inspection crackdown that resulted in an almost shutdown of cross-border traffic. Because the burden on border crossings was controversial in border states, the effort only lasted twenty days.
On December 20, 1989, the United States invaded Panama as part of Operation Just Cause, which involved 25,000 American troops. Gen. Manuel Noriega, head of the government of Panama, had been giving military assistance to Contra groups in Nicaragua at the request of the U.S. which, in exchange, tolerated his drug trafficking a
ctivities, which they had known about since the 1960s. When the Drug Enforcement Administration (DEA) tried to indict Noriega in 1971, the CIA prevented them from doing so. The CIA, which was then directed by future president George H. W. Bush, provided Noriega with hundreds of thousands of dollars per year as payment for his work in Latin America. When CIA pilot Eugene Hasenfus was shot down over Nicaragua by the Sandinistas, documents aboard the plane revealed many of the CIA’s activities in Latin America, and the CIA’s connections with Noriega became a public relations “liability” for the U.S. government, which finally allowed the DEA to indict him for drug trafficking, after decades of tolerating his drug operations. Operation Just Cause, whose purpose was to capture Noriega and overthrow his government; Noriega found temporary asylum in the Papal Nuncio, and surrendered to U.S. soldiers on January 3, 1990. He was sentenced by a court in Miami to 45 years in prison.
As part of its Plan Colombia program, the United States government currently provides hundreds of millions of dollars per year of military aid, training, and equipment to Colombia, to fight left-wing guerrillas such as the Revolutionary Armed Forces of Colombia (FARC-EP), which has been accused of being involved in drug trafficking.
Private U.S. corporations have signed contracts to carry out anti-drug activities as part of Plan Colombia. DynCorp, the largest private company involved, was among those contracted by the State Department, while others signed contracts with the Defense Department.
Colombian military personnel have received extensive counterinsurgency training from U.S. military and law enforcement agencies, including the School of Americas (SOA). Author Grace Livingstone has stated that more Colombian SOA graduates have been implicated in human rights abuses than currently known SOA graduates from any other country. All of the commanders of the brigades highlighted in a 2001 Human Rights Watch report on Colombia were graduates of the SOA, including the III brigade in Valle del Cauca, where the 2001 Alto Naya Massacre occurred. US-trained officers have been accused of being directly or indirectly involved in many atrocities during the 1990s, including the Massacre of Trujillo and the 1997 Mapiripn Massacre.
In 2000, the Clinton administration initially waived all but one of the human rights conditions attached to Plan Colombia, considering such aid as crucial to national security at the time.
The efforts of U.S. and Colombian governments have been criticized for focusing on fighting leftist guerrillas in southern regions without applying enough pressure on right-wing paramilitaries and continuing drug smuggling operations in the north of the country. Human Rights Watch, congressional committees and other entities have documented the existence of connections between members of the Colombian military and the AUC, which the U.S. government has listed as a terrorist group, and that Colombian military personnel have committed human rights abuses which would make them ineligible for U.S. aid under current laws.
In 2010, the Washington Office on Latin America concluded that both Plan Colombia and the Colombian government’s security strategy “came at a high cost in lives and resources, only did part of the job, are yielding diminishing returns and have left important institutions weaker.”
A 2014 report by the RAND Corporation, which was issued to analyze viable strategies for the Mexican drug war considering successes experienced in Columbia, noted:
Between 1999 and 2002, the United States gave Colombia $2.04 billion in aid, 81 percent of which was for military purposes, placing Colombia just below Israel and Egypt among the largest recipients of U.S. military assistance. Colombia increased its defense spending from 3.2 percent of gross domestic product (GDP) in 2000 to 4.19 percent in 2005. Overall, the results were extremely positive. Greater spending on infrastructure and social programs helped the Colombian government increase its political legitimacy, while improved security forces were better able to consolidate control over large swaths of the country previously overrun by insurgents and drug cartels.
It also notes that, “Plan Colombia has been widely hailed as a success, and some analysts believe that, by 2010, Colombian security forces had finally gained the upper hand once and for all.”
The Mrida Initiative is a security cooperation between the United States and the government of Mexico and the countries of Central America. It was approved on June 30, 2008, and its stated aim is combating the threats of drug trafficking and transnational crime. The Mrida Initiative appropriated $1.4 billion in a three-year commitment (20082010) to the Mexican government for military and law enforcement training and equipment, as well as technical advice and training to strengthen the national justice systems. The Mrida Initiative targeted many very important government officials, but it failed to address the thousands of Central Americans who had to flee their countries due to the danger they faced everyday because of the war on drugs. There is still not any type of plan that addresses these people. No weapons are included in the plan.
The United States regularly sponsors the spraying of large amounts of herbicides such as glyphosate over the jungles of Central and South America as part of its drug eradication programs. Environmental consequences resulting from aerial fumigation have been criticized as detrimental to some of the world’s most fragile ecosystems; the same aerial fumigation practices are further credited with causing health problems in local populations.
In 2012, the U.S. sent DEA agents to Honduras to assist security forces in counternarcotics operations. Honduras has been a major stop for drug traffickers, who use small planes and landing strips hidden throughout the country to transport drugs. The U.S. government made agreements with several Latin American countries to share intelligence and resources to counter the drug trade. DEA agents, working with other U.S. agencies such as the State Department, the CBP, and Joint Task Force-Bravo, assisted Honduras troops in conducting raids on traffickers’ sites of operation.
The War on Drugs has been a highly contentious issue since its inception. A poll on October 2, 2008, found that three in four Americans believed that the War On Drugs was failing.
At a meeting in Guatemala in 2012, three former presidents from Guatemala, Mexico and Colombia said that the war on drugs had failed and that they would propose a discussion on alternatives, including decriminalization, at the Summit of the Americas in April of that year. Guatemalan President Otto Prez Molina said that the war on drugs was exacting too high a price on the lives of Central Americans and that it was time to “end the taboo on discussing decriminalization”. At the summit, the government of Colombia pushed for the most far-reaching change to drugs policy since the war on narcotics was declared by Nixon four decades prior, citing the catastrophic effects it had had in Colombia.
Several critics have compared the wholesale incarceration of the dissenting minority of drug users to the wholesale incarceration of other minorities in history. Psychiatrist Thomas Szasz, for example, writes in 1997 “Over the past thirty years, we have replaced the medical-political persec
ution of illegal sex users (‘perverts’ and ‘psychopaths’) with the even more ferocious medical-political persecution of illegal drug users.”
Penalties for drug crimes among American youth almost always involve permanent or semi-permanent removal from opportunities for education, strip them of voting rights, and later involve creation of criminal records which make employment more difficult. Thus, some authors maintain that the War on Drugs has resulted in the creation of a permanent underclass of people who have few educational or job opportunities, often as a result of being punished for drug offenses which in turn have resulted from attempts to earn a living in spite of having no education or job opportunities.
According to a 2008 study published by Harvard economist Jeffrey A. Miron, the annual savings on enforcement and incarceration costs from the legalization of drugs would amount to roughly $41.3 billion, with $25.7 billion being saved among the states and over $15.6 billion accrued for the federal government. Miron further estimated at least $46.7 billion in tax revenue based on rates comparable to those on tobacco and alcohol ($8.7 billion from marijuana, $32.6 billion from cocaine and heroin, remainder from other drugs).
Low taxation in Central American countries has been credited with weakening the region’s response in dealing with drug traffickers. Many cartels, especially Los Zetas have taken advantage of the limited resources of these nations. 2010 tax revenue in El Salvador, Guatemala, and Honduras, composed just 13.53% of GDP. As a comparison, in Chile and the U.S., taxes were 18.6% and 26.9% of GDP respectively. However, direct taxes on income are very hard to enforce and in some cases tax evasion is seen as a national pastime.
The status of coca and coca growers has become an intense political issue in several countries, including Colombia and particularly Bolivia, where the president, Evo Morales, a former coca growers’ union leader, has promised to legalise the traditional cultivation and use of coca. Indeed, legalization efforts have yielded some successes under the Morales administration when combined with aggressive and targeted eradication efforts. The country saw a 12-13% decline in coca cultivation in 2011 under Morales, who has used coca growers’ federations to ensure compliance with the law rather than providing a primary role for security forces.
The coca eradication policy has been criticised for its negative impact on the livelihood of coca growers in South America. In many areas of South America the coca leaf has traditionally been chewed and used in tea and for religious, medicinal and nutritional purposes by locals. For this reason many insist that the illegality of traditional coca cultivation is unjust. In many areas the US government and military has forced the eradication of coca without providing for any meaningful alternative crop for farmers, and has additionally destroyed many of their food or market crops, leaving them starving and destitute.
The CIA, DEA, State Department, and several other U.S. government agencies have been implicated in relations with various groups involved in drug trafficking.
Senator John Kerry’s 1988 U.S. Senate Committee on Foreign Relations report on Contra drug links concludes that members of the U.S. State Department “who provided support for the Contras are involved in drug trafficking… and elements of the Contras themselves knowingly receive financial and material assistance from drug traffickers.” The report further states that “the Contra drug links include… payments to drug traffickers by the U.S. State Department of funds authorized by the Congress for humanitarian assistance to the Contras, in some cases after the traffickers had been indicted by federal law enforcement agencies on drug charges, in others while traffickers were under active investigation by these same agencies.”
In 1996, journalist Gary Webb published reports in the San Jose Mercury News, and later in his book Dark Alliance, detailing how Contras, had been involved in distributing crack cocaine into Los Angeles whilst receiving money from the CIA. Contras used money from drug trafficking to buy weapons
Webb’s premise regarding the U.S. Government connection was initially attacked at the time by the media. It is now widely accepted that Webb’s main assertion of government “knowledge of drug operations, and collaboration with and protection of known drug traffickers” was correct. In 1998, CIA Inspector General Frederick Hitz published a two-volume report that while seemingly refuting Webb’s claims of knowledge and collaboration in its conclusions did not deny them in its body. Hitz went on to admit CIA improprieties in the affair in testimony to a House congressional committee. Some of Webb’s work acknowledging is now widely accepted.
According to Rodney Campbell, an editorial assistant to Nelson Rockefeller, during World War II, the United States Navy, concerned that strikes and labor disputes in U.S. eastern shipping ports would disrupt wartime logistics, released the mobster Lucky Luciano from prison, and collaborated with him to help the mafia take control of those ports. Labor union members were terrorized and murdered by mafia members as a means of preventing labor unrest and ensuring smooth shipping of supplies to Europe.
According to Alexander Cockburn and Jeffrey St. Clair, in order to prevent Communist party members from being elected in Italy following World War II, the CIA worked closely with the Sicilian Mafia, protecting them and assisting in their worldwide heroin smuggling operations. The mafia was in conflict with leftist groups and was involved in assassinating, torturing, and beating leftist political organizers.
In 1986, the US Defense Department funded a two-year study by the RAND Corporation, which found that the use of the armed forces to interdict drugs coming into the United States would have little or no effect on cocaine traffic and might, in fact, raise the profits of cocaine cartels and manufacturers. The 175-page study, “Sealing the Borders: The Effects of Increased Military Participation in Drug Interdiction”, was prepared by seven researchers, mathematicians and economists at the National Defense Research Institute, a branch of the RAND, and was released in 1988. The study noted that seven prior studies in the past nine years, including one by the Center for Naval Research and the Office of Technology Assessment, had come to similar conclusions. Interdiction efforts, using current armed forces resources, would have almost no effect on cocaine importation into the United States, the report concluded.
During the early-to-mid-1990s, the Clinton administration ordered and funded a major cocaine policy study, again by RAND. The Rand Drug Policy Research Center study concluded that $3 billion should be switched from federal and local law enforcement to treatment. The report said that treatment is the cheapest way to cut drug use, stating that drug treatment is twenty-three times more effective than the supply-side “war on drugs”.
The National Research Council Committee on Data and Research for Policy on Illegal Drugs published its findings in 2001 on the efficacy of the drug war. The NRC Committee found that existing studies on efforts to address drug usage and smuggling, from U.S. military operations to eradicate coca fields in Colombia, to domestic drug treatment centers, have all been inconclusive, if the programs ha
ve been evaluated at all: “The existing drug-use monitoring systems are strikingly inadequate to support the full range of policy decisions that the nation must make…. It is unconscionable for this country to continue to carry out a public policy of this magnitude and cost without any way of knowing whether and to what extent it is having the desired effect.” The study, though not ignored by the press, was ignored by top-level policymakers, leading Committee Chair Charles Manski to conclude, as one observer notes, that “the drug war has no interest in its own results”.
In mid-1995, the US government tried to reduce the supply of methamphetamine precursors to disrupt the market of this drug. According to a 2009 study, this effort was successful, but its effects were largely temporary.
During alcohol prohibition, the period from 1920 to 1933, alcohol use initially fell but began to increase as early as 1922. It has been extrapolated that even if prohibition had not been repealed in 1933, alcohol consumption would have quickly surpassed pre-prohibition levels. One argument against the War on Drugs is that it uses similar measures as Prohibition and is no more effective.
In the six years from 2000 to 2006, the U.S. spent $4.7 billion on Plan Colombia, an effort to eradicate coca production in Colombia. The main result of this effort was to shift coca production into more remote areas and force other forms of adaptation. The overall acreage cultivated for coca in Colombia at the end of the six years was found to be the same, after the U.S. Drug Czar’s office announced a change in measuring methodology in 2005 and included new areas in its surveys. Cultivation in the neighboring countries of Peru and Bolivia increased, some would describe this effect like squeezing a balloon.
Similar lack of efficacy is observed in some other countries pursuing similar policies. In 1994, 28.5% of Canadians reported having consumed illicit drugs in their life; by 2004, that figure had risen to 45%. 73% of the $368 million spent by the Canadian government on targeting illicit drugs in 20042005 went toward law enforcement rather than treatment, prevention or harm reduction.
Richard Davenport-Hines, in his book The Pursuit of Oblivion, criticized the efficacy of the War on Drugs by pointing out that
1015% of illicit heroin and 30% of illicit cocaine is intercepted. Drug traffickers have gross profit margins of up to 300%. At least 75% of illicit drug shipments would have to be intercepted before the traffickers’ profits were hurt.
Alberto Fujimori, president of Peru from 1990 to 2000, described U.S. foreign drug policy as “failed” on grounds that “for 10 years, there has been a considerable sum invested by the Peruvian government and another sum on the part of the American government, and this has not led to a reduction in the supply of coca leaf offered for sale. Rather, in the 10 years from 1980 to 1990, it grew 10-fold.”
At least 500 economists, including Nobel Laureates Milton Friedman,George Akerlof and Vernon L. Smith, have noted that reducing the supply of marijuana without reducing the demand causes the price, and hence the profits of marijuana sellers, to go up, according to the laws of supply and demand. The increased profits encourage the producers to produce more drugs despite the risks, providing a theoretical explanation for why attacks on drug supply have failed to have any lasting effect. The aforementioned economists published an open letter to President George W. Bush stating “We urge…the country to commence an open and honest debate about marijuana prohibition… At a minimum, this debate will force advocates of current policy to show that prohibition has benefits sufficient to justify the cost to taxpayers, foregone tax revenues and numerous ancillary consequences that result from marijuana prohibition.”
The declaration from the World Forum Against Drugs, 2008 state that a balanced policy of drug abuse prevention, education, treatment, law enforcement, research, and supply reduction provides the most effective platform to reduce drug abuse and its associated harms and call on governments to consider demand reduction as one of their first priorities in the fight against drug abuse.
Despite over $7 billion spent annually towards arresting and prosecuting nearly 800,000 people across the country for marijuana offenses in 2005 (FBI Uniform Crime Reports), the federally funded Monitoring the Future Survey reports about 85% of high school seniors find marijuana “easy to obtain”. That figure has remained virtually unchanged since 1975, never dropping below 82.7% in three decades of national surveys. The Drug Enforcement Administration states that the number of users of marijuana in the U.S. declined between 2000 and 2005 even with many states passing new medical marijuana laws making access easier, though usage rates remain higher than they were in the 1990s according to the National Survey on Drug Use and Health.
ONDCP stated in April 2011 that there has been a 46 percent drop in cocaine use among young adults over the past five years, and a 65 percent drop in the rate of people testing positive for cocaine in the workplace since 2006. At the same time, a 2007 study found that up to 35% of college undergraduates used stimulants not prescribed to them.
A 2013 study found that prices of heroin, cocaine and cannabis had decreased from 1990 to 2007, but the purity of these drugs had increased during the same time.
The legality of the War on Drugs has been challenged on four main grounds in the US.
Several authors believe that the United States’ federal and state governments have chosen wrong methods for combatting the distribution of illicit substances. Aggressive, heavy-handed enforcement funnel individuals through courts and prisons, instead of treating the cause of the addiction, the focus of government efforts has been on punishment. By making drugs illegal rather than regulating them, the War on Drugs creates a highly profitable black market. Jefferson Fish has edited scholarly collections of articles offering a wide variety of public health based and rights based alternative drug policies.
In the year 2000, the United States drug-control budget reached 18.4 billion dollars, nearly half of which was spent financing law enforcement while only one sixth was spent on treatment. In the year 2003, 53 percent of the requested drug control budget was for enforcement, 29 percent for treatment, and 18 percent for prevention. The state of New York, in particular, designated 17 percent of its budget towards substance-abuse-related spending. Of that, a mere one percent was put towards prevention, treatment, and research.
In a survey taken by Substance Abuse and Mental Health Services Administration (SAMHSA), it was found that substance abusers that remain in treatment longer are less likely to resume their former drug habits. Of the people that were studied, 66 percent were cocaine users. After experiencing long-term in-patient treatment, only 22 percent returned to the use of cocaine. Treatment had reduced the number of cocaine abusers by two-thirds. By spending the majority of its money on law enforcement, the federal government had underestimated the true value of drug-treatment facilities and their benefit towards reducing the number of addicts in the U.S.
In 2004 the federal government issued the National Drug Con
trol Strategy. It supported programs designed to expand treatment options, enhance treatment delivery, and improve treatment outcomes. For example, the Strategy provided SAMHSA with a $100.6 million grant to put towards their Access to Recovery (ATR) initiative. ATR is a program that provides vouchers to addicts to provide them with the means to acquire clinical treatment or recovery support. The project’s goals are to expand capacity, support client choice, and increase the array of faith-based and community based providers for clinical treatment and recovery support services. The ATR program will also provide a more flexible array of services based on the individual’s treatment needs.
The 2004 Strategy additionally declared a significant 32 million dollar raise in the Drug Courts Program, which provides drug offenders with alternatives to incarceration. As a substitute for imprisonment, drug courts identify substance-abusing offenders and place them under strict court monitoring and community supervision, as well as provide them with long-term treatment services. According to a report issued by the National Drug Court Institute, drug courts have a wide array of benefits, with only 16.4 percent of the nation’s drug court graduates rearrested and charged with a felony within one year of completing the program (versus the 44.1% of released prisoners who end up back in prison within 1-year). Additionally, enrolling an addict in a drug court program costs much less than incarcerating one in prison. According to the Bureau of Prisons, the fee to cover the average cost of incarceration for Federal inmates in 2006 was $24,440. The annual cost of receiving treatment in a drug court program ranges from $900 to $3,500. Drug courts in New York State alone saved $2.54 million in incarceration costs.
Read the original:
Posted: June 16, 2016 at 5:47 pm
February 5, 2000, Bill Lind, 230 Comments
An Accuracy in Academia Address by Bill Lind
Variations of this speech have been delivered to various AIA conferences including the 2000 Consevative University at American University
Where does all this stuff that youve heard about this morning the victim feminism, the gay rights movement, the invented statistics, the rewritten history, the lies, the demands, all the rest of it where does it come from? For the first time in our history, Americans have to be fearful of what they say, of what they write, and of what they think. They have to be afraid of using the wrong word, a word denounced as offensive or insensitive, or racist, sexist, or homophobic.
We have seen other countries, particularly in this century, where this has been the case. And we have always regarded them with a mixture of pity, and to be truthful, some amusement, because it has struck us as so strange that people would allow a situation to develop where they would be afraid of what words they used. But we now have this situation in this country. We have it primarily on college campuses, but it is spreading throughout the whole society. Were does it come from? What is it?
We call it Political Correctness. The name originated as something of a joke, literally in a comic strip, and we tend still to think of it as only half-serious. In fact, its deadly serious. It is the great disease of our century, the disease that has left tens of millions of people dead in Europe, in Russia, in China, indeed around the world. It is the disease of ideology. PC is not funny. PC is deadly serious.
If we look at it analytically, if we look at it historically, we quickly find out exactly what it is. Political Correctness is cultural Marxism. It is Marxism translated from economic into cultural terms. It is an effort that goes back not to the 1960s and the hippies and the peace movement, but back to World War I. If we compare the basic tenets of Political Correctness with classical Marxism the parallels are very obvious.
First of all, both are totalitarian ideologies. The totalitarian nature of Political Correctness is revealed nowhere more clearly than on college campuses, many of which at this point are small ivy covered North Koreas, where the student or faculty member who dares to cross any of the lines set up by the gender feminist or the homosexual-rights activists, or the local black or Hispanic group, or any of the other sainted victims groups that PC revolves around, quickly find themselves in judicial trouble. Within the small legal system of the college, they face formal charges some star-chamber proceeding and punishment. That is a little look into the future that Political Correctness intends for the nation as a whole.
Indeed, all ideologies are totalitarian because the essence of an ideology (I would note that conservatism correctly understood is not an ideology) is to take some philosophy and say on the basis of this philosophy certain things must be true such as the whole of the history of our culture is the history of the oppression of women. Since reality contradicts that, reality must be forbidden. It must become forbidden to acknowledge the reality of our history. People must be forced to live a lie, and since people are naturally reluctant to live a lie, they naturally use their ears and eyes to look out and say, Wait a minute. This isnt true. I can see it isnt true, the power of the state must be put behind the demand to live a lie. That is why ideology invariably creates a totalitarian state.
Second, the cultural Marxism of Political Correctness, like economic Marxism, has a single factor explanation of history. Economic Marxism says that all of history is determined by ownership of means of production. Cultural Marxism, or Political Correctness, says that all history is determined by power, by which groups defined in terms of race, sex, etc., have power over which other groups. Nothing else matters. All literature, indeed, is about that. Everything in the past is about that one thing.
Third, just as in classical economic Marxism certain groups, i.e. workers and peasants, are a priori good, and other groups, i.e., the bourgeoisie and capital owners, are evil. In the cultural Marxism of Political Correctness certain groups are good feminist women, (only feminist women, non-feminist women are deemed not to exist) blacks, Hispanics, homosexuals. These groups are determined to be victims, and therefore automatically good regardless of what any of them do. Similarly, white males are determined automatically to be evil, thereby becoming the equivalent of the bourgeoisie in economic Marxism.
Fourth, both economic and cultural Marxism rely on expropriation. When the classical Marxists, the communists, took over a country like Russia, they expropriated the bourgeoisie, they took away their property. Similarly, when the cultural Marxists take over a university campus, they expropriate through things like quotas for admissions. When a white student with superior qualifications is denied admittance to a college in favor of a black or Hispanic who isnt as well qualified, the white student is expropriated. And indeed, affirmative action, in our whole society today, is a system of expropriation. White owned companies dont get a contract because the contract is reserved for a company owned by, say, Hispanics or women. So expropriation is a principle tool for both forms of Marxism.
And finally, both have a method of analysis that automatically gives the answers they want. For the classical Marxist, its Marxist economics. For the cultural Marxist, its deconstruction. Deconstruction essentially takes any text, removes all meaning from it and re-inserts any meaning desired. So we find, for example, that all of Shakespeare is about the suppression of women, or the Bible is really about race and gender. All of these texts simply become grist for the mill, which proves that all history is about which groups have power over which other groups. So the parallels are very evident between the classical Marxism that were familiar with in the old Soviet Union and the cultural Marxism that we see today as Political Correctness.
But the parallels are not accidents. The parallels did not come from nothing. The fact of the matter is that Political Correctness has a history, a history that is much longer than many people are aware of outside a small group of academics who have studied this. And the history goes back, as I said, to World War I, as do so many of the pathologies that are today bringing our society, and indeed our culture, down.
Marxist theory said that when the general European war came (as it did come in Europe in 1914), the working class throughout Europe would rise up and overthrow their governments the bourgeois governments because the workers had more in common with each other across the national boundaries than they had in common with the bourgeoisie and the ruling class in their own country. Well, 1914 came and it didnt happen. Throughout Europe, workers rallied to their flag and happily marched off to fight each other. The Kaiser shook hands with the leaders of the Marxist Social Democratic Party in Germany and said there are no parties now, there are only Germans. And this happened in every country in Europe. So something was wrong.
Marxists knew by definition it couldnt be the theory. In 1917, they finally got a Marxist coup in Russia and it looked like the theory was working, but it stalled again. It didnt spread and when attempts were made to spread immediately after the war, with the Spartacist uprising in Berlin, with the Bela Kun government in Hungary, with the Munich Soviet, the workers didnt support them.
So the Marxists had a problem. And two Marxist theorists went to work on it: Antonio Gramsci in Italy and Georg Lukacs in Hungary. Gramsci said the workers will never see their true class interests, as defined by Marxism, until they are freed from Western culture, and particularly from the Christian religion that they are blinded by culture and religion to their true class interests. Lukacs, who was considered the most brilliant Marxist theorist since Marx himself, said in 1919, Who will save us from Western Civilization? He also theorized that the great obstacle to the creation of a Marxist paradise was the culture: Western civilization itself.
Lukacs gets a chance to put his ideas into practice, because when the home grown Bolshevik Bela Kun government is established in Hungary in 1919, he becomes deputy commissar for culture, and the first thing he did was introduce sex education into the Hungarian schools. This ensured that the workers would not support the Bela Kun government, because the Hungarian people looked at this aghast, workers as well as everyone else. But he had already made the connection that today many of us are still surprised by, that we would consider the latest thing.
In 1923 in Germany, a think-tank is established that takes on the role of translating Marxism from economic into cultural terms, that creates Political Correctness as we know it today, and essentially it has created the basis for it by the end of the 1930s. This comes about because the very wealthy young son of a millionaire German trader by the name of Felix Weil has become a Marxist and has lots of money to spend. He is disturbed by the divisions among the Marxists, so he sponsors something called the First Marxist Work Week, where he brings Lukacs and many of the key German thinkers together for a week, working on the differences of Marxism.
And he says, What we need is a think-tank. Washington is full of think tanks and we think of them as very modern. In fact they go back quite a ways. He endows an institute, associated with Frankfurt University, established in 1923, that was originally supposed to be known as the Institute for Marxism. But the people behind it decided at the beginning that it was not to their advantage to be openly identified as Marxist. The last thing Political Correctness wants is for people to figure out its a form of Marxism. So instead they decide to name it the Institute for Social Research.
Weil is very clear about his goals. In 1917, he wrote to Martin Jay the author of a principle book on the Frankfurt School, as the Institute for Social Research soon becomes known informally, and he said, I wanted the institute to become known, perhaps famous, due to its contributions to Marxism. Well, he was successful. The first director of the Institute, Carl Grunberg, an Austrian economist, concluded his opening address, according to Martin Jay, by clearly stating his personal allegiance to Marxism as a scientific methodology. Marxism, he said, would be the ruling principle at the Institute, and that never changed. The initial work at the Institute was rather conventional, but in 1930 it acquired a new director named Max Horkheimer, and Horkheimers views were very different. He was very much a Marxist renegade. The people who create and form the Frankfurt School are renegade Marxists. Theyre still very much Marxist in their thinking, but theyre effectively run out of the party. Moscow looks at what they are doing and says, Hey, this isnt us, and were not going to bless this.
Horkheimers initial heresy is that he is very interested in Freud, and the key to making the translation of Marxism from economic into cultural terms is essentially that he combined it with Freudism. Again, Martin Jay writes, If it can be said that in the early years of its history, the Institute concerned itself primarily with an analysis of bourgeois societys socio-economic sub-structure, and I point out that Jay is very sympathetic to the Frankfurt School, Im not reading from a critic here in the years after 1930 its primary interests lay in its cultural superstructure. Indeed the traditional Marxist formula regarding the relationship between the two was brought into question by Critical Theory.
The stuff weve been hearing about this morning the radical feminism, the womens studies departments, the gay studies departments, the black studies departments all these things are branches of Critical Theory. What the Frankfurt School essentially does is draw on both Marx and Freud in the 1930s to create this theory called Critical Theory. The term is ingenious because youre tempted to ask, What is the theory? The theory is to criticize. The theory is that the way to bring down Western culture and the capitalist order is not to lay down an alternative. They explicitly refuse to do that. They say it cant be done, that we cant imagine what a free society would look like (their definition of a free society). As long as were living under repression the repression of a capitalistic economic order which creates (in their theory) the Freudian condition, the conditions that Freud describes in individuals of repression we cant even imagine it. What Critical Theory is about is simply criticizing. It calls for the most destructive criticism possible, in every possible way, designed to bring the current order down. And, of course, when we hear from the feminists that the whole of society is just out to get women and so on, that kind of criticism is a derivative of Critical Theory. It is all coming from the 1930s, not the 1960s.
Other key members who join up around this time are Theodore Adorno, and, most importantly, Erich Fromm and Herbert Marcuse. Fromm and Marcuse introduce an element which is central to Political Correctness, and thats the sexual element. And particularly Marcuse, who in his own writings calls for a society of polymorphous perversity, that is his definition of the future of the world that they want to create. Marcuse in particular by the 1930s is writing some very extreme stuff on the need for sexual liberation, but this runs through the whole Institute. So do most of the themes we see in Political Correctness, again in the early 30s. In Fromms view, masculinity and femininity were not reflections of essential sexual differences, as the Romantics had thought. They were derived instead from differences in life functions, which were in part socially determined. Sex is a construct; sexual differences are a construct.
Another example is the emphasis we now see on environmentalism. Materialism as far back as Hobbes had led to a manipulative dominating attitude toward nature. That was Horkhemier writing in 1933 in Materialismus und Moral. The theme of mans domination of nature, according to Jay, was to become a central concern of the Frankfurt School in subsequent years. Horkheimers antagonism to the fetishization of labor, (heres were theyre obviously departing from Marxist orthodoxy) expressed another dimension of his materialism, the demand for human, sensual happiness. In one of his most trenchant essays, Egoism and the Movement for Emancipation, written in 1936, Horkeimer discussed the hostility to personal gratification inherent in bourgeois culture. And he specifically referred to the Marquis de Sade, favorably, for his protestagainst asceticism in the name of a higher morality.
How does all of this stuff flood in here? How does it flood into our universities, and indeed into our lives today? The members of the Frankfurt School are Marxist, they are also, to a man, Jewish. In 1933 the Nazis came to power in Germany, and not surprisingly they shut down the Institute for Social Research. And its members fled. They fled to New York City, and the Institute was reestablished there in 1933 with help from Columbia University. And the members of the Institute, gradually through the 1930s, though many of them remained writing in German, shift their focus from Critical Theory about German society, destructive criticism about every aspect of that society, to Critical Theory directed toward American society. There is another very important transition when the war comes. Some of them go to work for the government, including Herbert Marcuse, who became a key figure in the OSS (the predecessor to the CIA), and some, including Horkheimer and Adorno, move to Hollywood.
These origins of Political Correctness would probably not mean too much to us today except for two subsequent events. The first was the student rebellion in the mid-1960s, which was driven largely by resistance to the draft and the Vietnam War. But the student rebels needed theory of some sort. They couldnt just get out there and say, Hell no we wont go, they had to have some theoretical explanation behind it. Very few of them were interested in wading through Das Kapital. Classical, economic Marxism is not light, and most of the radicals of the 60s were not deep. Fortunately for them, and unfortunately for our country today, and not just in the university, Herbert Marcuse remained in America when the Frankfurt School relocated back to Frankfurt after the war. And whereas Mr. Adorno in Germany is appalled by the student rebellion when it breaks out there when the student rebels come into Adornos classroom, he calls the police and has them arrested Herbert Marcuse, who remained here, saw the 60s student rebellion as the great chance. He saw the opportunity to take the work of the Frankfurt School and make it the theory of the New Left in the United States.
One of Marcuses books was the key book. It virtually became the bible of the SDS and the student rebels of the 60s. That book was Eros and Civilization. Marcuse argues that under a capitalistic order (he downplays the Marxism very strongly here, it is subtitled, A Philosophical Inquiry into Freud, but the framework is Marxist), repression is the essence of that order and that gives us the person Freud describes the person with all the hang-ups, the neuroses, because his sexual instincts are repressed. We can envision a future, if we can only destroy this existing oppressive order, in which we liberate eros, we liberate libido, in which we have a world of polymorphous perversity, in which you can do you own thing. And by the way, in that world there will no longer be work, only play. What a wonderful message for the radicals of the mid-60s! Theyre students, theyre baby-boomers, and theyve grown up never having to worry about anything except eventually having to get a job. And here is a guy writing in a way they can easily follow. He doesnt require them to read a lot of heavy Marxism and tells them everything they want to hear which is essentially, Do your own thing, If it feels good do it, and You never have to go to work. By the way, Marcuse is also the man who creates the phrase, Make love, not war. Coming back to the situation people face on campus, Marcuse defines liberating tolerance as intolerance for anything coming from the Right and tolerance for anything coming from the Left. Marcuse joined the Frankfurt School, in 1932 (if I remember right). So, all of this goes back to the 1930s.
In conclusion, America today is in the throes of the greatest and direst transformation in its history. We are becoming an ideological state, a country with an official state ideology enforced by the power of the state. In hate crimes we now have people serving jail sentences for political thoughts. And the Congress is now moving to expand that category ever further. Affirmative action is part of it. The terror against anyone who dissents from Political Correctness on campus is part of it. Its exactly what we have seen happen in Russia, in Germany, in Italy, in China, and now its coming here. And we dont recognize it because we call it Political Correctness and laugh it off. My message today is that its not funny, its here, its growing and it will eventually destroy, as it seeks to destroy, everything that we have ever defined as our freedom and our culture.
Read more from the original source:
Posted: June 12, 2016 at 8:25 pm
Biological warfare (BW)also known as germ warfareis the use of biological toxins or infectious agents such as bacteria, viruses, and fungi with the intent to kill or incapacitate humans, animals or plants as an act of war. Biological weapons (often termed “bio-weapons”, “biological threat agents”, or “bio-agents”) are living organisms or replicating entities (viruses, which are not universally considered “alive”) that reproduce or replicate within their host victims. Entomological (insect) warfare is also considered a type of biological weapon. This type of warfare is distinct from nuclear warfare and chemical warfare, which together with biological warfare make up NBC, the military acronym for nuclear, biological, and chemical warfare using weapons of mass destruction (WMDs). None of these are conventional weapons, which are primarily due to their explosive, kinetic, or incendiary potential.
Biological weapons may be employed in various ways to gain a strategic or tactical advantage over the enemy, either by threats or by actual deployments. Like some of the chemical weapons, biological weapons may also be useful as area denial weapons. These agents may be lethal or non-lethal, and may be targeted against a single individual, a group of people, or even an entire population. They may be developed, acquired, stockpiled or deployed by nation states or by non-national groups. In the latter case, or if a nation-state uses it clandestinely, it may also be considered bioterrorism.
There is an overlap between biological warfare and chemical warfare, as the use of toxins produced by living organisms is considered under the provisions of both the Biological Weapons Convention and the Chemical Weapons Convention. Toxins and psychochemical weapons are often referred to as midspectrum agents. Unlike bioweapons, these midspectrum agents do not reproduce in their host and are typically characterized by shorter incubation periods.
Offensive biological warfare, including mass production, stockpiling and use of biological weapons, was outlawed by the 1972 Biological Weapons Convention (BWC). The rationale behind this treaty, which has been ratified or acceded to by 170 countries as of April 2013, is to prevent a biological attack which could conceivably result in large numbers of civilian casualties and cause severe disruption to economic and societal infrastructure. Many countries, including signatories of the BWC, currently pursue research into the defense or protection against BW, which is not prohibited by the BWC.
A nation or group that can pose a credible threat of mass casualty has the ability to alter the terms on which other nations or groups interact with it. Biological weapons allow for the potential to create a level of destruction and loss of life far in excess of nuclear, chemical or conventional weapons, relative to their mass and cost of development and storage. Therefore, biological agents may be useful as strategic deterrents in addition to their utility as offensive weapons on the battlefield.
As a tactical weapon for military use, a significant problem with a BW attack is that it would take days to be effective, and therefore might not immediately stop an opposing force. Some biological agents (smallpox, pneumonic plague) have the capability of person-to-person transmission via aerosolized respiratory droplets. This feature can be undesirable, as the agent(s) may be transmitted by this mechanism to unintended populations, including neutral or even friendly forces. While containment of BW is less of a concern for certain criminal or terrorist organizations, it remains a significant concern for the military and civilian populations of virtually all nations.
Rudimentary forms of biological warfare have been practiced since antiquity. During the 6th century BC, the Assyrians poisoned enemy wells with a fungus that would render the enemy delirious. In 1346, the bodies of Mongol warriors of the Golden Horde who had died of plague were thrown over the walls of the besieged Crimean city of Kaffa. Specialists disagree over whether this operation may have been responsible for the spread of the Black Death into Europe.
It has been claimed that the British Marines used smallpox in New South Wales in 1789. Historians have long debated inconclusively whether the British Army used smallpox in an episode against Native Americans in 1763.
By 1900 the germ theory and advances in bacteriology brought a new level of sophistication to the techniques for possible use of bio-agents in war. Biological sabotagein the form of anthrax and glanderswas undertaken on behalf of the Imperial German government during World War I (19141918), with indifferent results. The Geneva Protocol of 1925 prohibited the use of chemical weapons and biological weapons.
With the onset of World War II, the Ministry of Supply in the United Kingdom established a BW program at Porton Down, headed by the microbiologist Paul Fildes. The research was championed by Winston Churchill and soon tularemia, anthrax, brucellosis, and botulism toxins had been effectively weaponized. In particular, Gruinard Island in Scotland, during a series of extensive tests was contaminated with anthrax for the next 56 years. Although the UK never offensively used the biological weapons it developed on its own, its program was the first to successfully weaponize a variety of deadly pathogens and bring them into industrial production.
When the USA entered the war, mounting British pressure for the creation of a similar research program for an Allied pooling of resources, led to the creation of a large industrial complex at Fort Detrick, Maryland in 1942 under the direction of George W. Merck. The biological and chemical weapons developed during that period were tested at the Dugway Proving Grounds in Utah. Soon there were facilities for the mass production of anthrax spores, brucellosis, and botulism toxins, although the war was over before these weapons could be of much operational use.
The most notorious program of the period was run by the secret Imperial Japanese Army Unit 731 during the war, based at Pingfan in Manchuria and commanded by Lieutenant General Shir Ishii. This unit did research on BW, conducted often fatal human experiments on prisoners, and produced biological weapons for combat use. Although the Japanese effort lacked the technological sophistication of the American or British programs, it far outstripped them in its widespread application and indiscriminate brutality. Biological weapons were used against both Chinese soldiers and civilians in several military campaigns. In 1940, the Japanese Army Air Force bombed Ningbo with ceramic bombs full of fleas carrying the bubonic plague. Many of these operations were ineffective due to inefficient delivery systems, although up to 400,000 people may have died. During the Zhejiang-Jiangxi Campaign in 1942, around 1,700 Japanese troops died out of a total 10,000 Japanese soldiers who fell ill with disease when their own biological weapons attack rebounded on their own forces.
During the final months of World War II, Japan planned to use plague as a biological weapon against U.S. civilians in San Diego, California, during Operation Cherry Blossoms at Night. The plan was set to launch on 22 September 1945, but it was not executed because of Japan’s surrender on 15 August 1945.
In Britain, the 1950s saw the weaponization of plague, brucellosis, tularemia and later equine encephalomyelitis and vaccinia viruses, but the programme was unilaterally cancelled in 1956. The United States Army Biological Warfare Laboratories weaponized anthrax, tularemia, brucellosis, Q-fever and others.
In 1969, the UK and the Warsaw Pact, separately, introduced proposals to the UN to ban biological weapons, and US President Richard Nixon terminated production of biological weapons, allowing only scientific research for defensive measures. The Biological and Toxin Weapons Convention was signed by the US, UK, USSR and other nations, as a ban on “development, production and stockpiling of microbes or their poisonous products except in amounts necessary for protective and peaceful research” in 1972. However, the Soviet Union continued research and production of massive offensive biological weapons in a program called Biopreparat, despite having signed the convention. By 2011, 165 countries had signed the treaty and none are proventhough nine are still suspectedto possess offensive BW programs.
It has been argued that rational state actors would never use biological weapons offensively. The argument is that biological weapons cannot be controlled: the weapon could backfire and harm the army on the offensive, perhaps having even worse effects than on the target. An agent like smallpox or other airborne viruses would almost certainly spread worldwide and ultimately infect the user’s home country. However, this argument does not necessarily apply to bacteria. For example, anthrax can easily be controlled and even created in a garden shed; the FBI suspects it can be done for as little as $2,500 using readily available laboratory equipment. Also, using microbial methods, bacteria can be suitably modified to be effective in only a narrow environmental range, the range of the target that distinctly differs from the army on the offensive. Thus only the target might be affected adversely. The weapon may be further used to bog down an advancing army making them more vulnerable to counterattack by the defending force.
Ideal characteristics of a biological agent to be used as a weapon against humans are high infectivity, high virulence, non-availability of vaccines, and availability of an effective and efficient delivery system. Stability of the weaponized agent (ability of the agent to retain its infectivity and virulence after a prolonged period of storage) may also be desirable, particularly for military applications, and the ease of creating one is often considered. Control of the spread of the agent may be another desired characteristic.
The primary difficulty is not the production of the biological agent, as many biological agents used in weapons can often be manufactured relatively quickly, cheaply and easily. Rather, it is the weaponization, storage and delivery in an effective vehicle to a vulnerable target that pose significant problems.
For example, Bacillus anthracis is considered an effective agent for several reasons. First, it forms hardy spores, perfect for dispersal aerosols. Second, this organism is not considered transmissible from person to person, and thus rarely if ever causes secondary infections. A pulmonary anthrax infection starts with ordinary influenza-like symptoms and progresses to a lethal hemorrhagic mediastinitis within 37 days, with a fatality rate that is 90% or higher in untreated patients. Finally, friendly personnel can be protected with suitable antibiotics.
A large-scale attack using anthrax would require the creation of aerosol particles of 1.5 to 5m: larger particles would not reach the lower respiratory tract, while smaller particles would be exhaled back out into the atmosphere. At this size, conductive powders tend to aggregate because of electrostatic charges, hindering dispersion. So the material must be treated to insulate and neutralize the charges. The weaponized agent must be resistant to degradation by rain and ultraviolet radiation from sunlight, while retaining the ability to efficiently infect the human lung. There are other technological difficulties as well, chiefly relating to storage of the weaponized agent.
Agents considered for weaponization, or known to be weaponized, include bacteria such as Bacillus anthracis, Brucella spp., Burkholderia mallei, Burkholderia pseudomallei, Chlamydophila psittaci, Coxiella burnetii, Francisella tularensis, some of the Rickettsiaceae (especially Rickettsia prowazekii and Rickettsia rickettsii), Shigella spp., Vibrio cholerae, and Yersinia pestis. Many viral agents have been studied and/or weaponized, including some of the Bunyaviridae (especially Rift Valley fever virus), Ebolavirus, many of the Flaviviridae (especially Japanese encephalitis virus), Machupo virus, Marburg virus, Variola virus, and Yellow fever virus. Fungal agents that have been studied include Coccidioides spp..
Toxins that can be used as weapons include ricin, staphylococcal enterotoxin B, botulinum toxin, saxitoxin, and many mycotoxins. These toxins and the organisms that produce them are sometimes referred to as select agents. In the United States, their possession, use, and transfer are regulated by the Centers for Disease Control and Prevention’s Select Agent Program.
The former US biological warfare program categorized its weaponized anti-personnel bio-agents as either Lethal Agents (Bacillus anthracis, Francisella tularensis, Botulinum toxin) or Incapacitating Agents (Brucella suis, Coxiella burnetii, Venezuelan equine encephalitis virus, Staphylococcal enterotoxin B).
The United States developed an anti-crop capability during the Cold War that used plant diseases (bioherbicides, or mycoherbicides) for destroying enemy agriculture. Biological weapons also target fisheries as well as water-based vegetation. It was believed that destruction of enemy agriculture on a strategic scale could thwart Sino-Soviet aggression in a general war. Diseases such as wheat blast and rice blast were weaponized in aerial spray tanks and cluster bombs for delivery to enemy watersheds in agricultural regions to initiate epiphytotics (epidemics among plants). When the United States renounced its offensive biological warfare program in 1969 and 1970, the vast majority of its biological arsenal was composed of these plant diseases. Enterotoxins and Mycotoxins were not affected by Nixon’s order.
Though herbicides are chemicals, they are often grouped with biological warfare and chemical warfare because they may work in a similar manner as biotoxins or bioregulators. The Army Biological Laboratory tested each agent and the Army’s Technical Escort Unit was responsible for transport of all chemical, biological, radiological (nuclear) materials. Scorched earth tactics or destroying livestock and farmland were carried out in the Vietnam war (cf. Agent Orange) and Eelam War in Sri Lanka.
Biological warfare can also specifically target plants to destroy crops or defoliate vegetation. The United States and Britain discovered plant growth regulators (i.e., herbicides) during the Second World War, and initiated a herbicidal warfare program that was eventually used in Malaya and Vietnam in counterinsurgency operations.
In 1980s Soviet Ministry of Agriculture had successfully developed variants of foot-and-mouth disease, and rinderpest against cows, African swine fever for pigs, and psittacosis to kill chicken. These agents were prepared to spray them down from tanks attached to airplanes over hundreds of miles. The secret program was code-named “Ecology”.
Attacking animals is another area of biological warfare intended to eliminate animal resources for transportation and food. In the First World War, German agents were arrested attempting to inoculate draft animals with anthrax, and they were believed to be responsible for outbreaks of glanders in horses and mules. The British tainted small feed cakes with anthrax in the Second World War as a potential means of attacking German cattle for food denial, but never employed the weapon. In the 1950s, the United States had a field trial with hog cholera. During the Mau Mau Uprising in 1952, the poisonous latex of the African milk bush was used to kill cattle.
Outside the context of war, humans have deliberately introduced the rabbit disease Myxomatosis, originating in South America, to Australia and Europe, with the intention of reducing the rabbit population which had devastating but temporary results, with wild rabbit populations reduced to a fraction of their former size but survivors developing immunity and increasing again.
Entomological warfare (EW) is a type of biological warfare that uses insects to attack the enemy. The concept has existed for centuries and research and development have continued into the modern era. EW has been used in battle by Japan and several other nations have developed and been accused of using an entomological warfare program. EW may employ insects in a direct attack or as vectors to deliver a biological agent, such as plague. Essentially, EW exists in three varieties. One type of EW involves infecting insects with a pathogen and then dispersing the insects over target areas. The insects then act as a vector, infecting any person or animal they might bite. Another type of EW is a direct insect attack against crops; the insect may not be infected with any pathogen but instead represents a threat to agriculture. The final method uses uninfected insects, such as bees, wasps, etc., to directly attack the enemy.
In 2010 at The Meeting of the States Parties to the Convention on the Prohibition of the Development, Production and Stockpiling of Bacteriological (Biological) and Toxin Weapons and Their Destruction in Geneva the sanitary epidemiological reconnaissance was suggested as well-tested means for enhancing the monitoring of infections and parasitic agents, for practical implementation of the International Health Regulations (2005). The aim was to prevent and minimize the consequences of natural outbreaks of dangerous infectious diseases as well as the threat of alleged use of biological weapons against BTWC States Parties.
It is important to note that most classical and modern biological weapons’ pathogens can be obtained from a plant or an animal which is naturally infected.
Indeed, in the largest biological weapons accident known the anthrax outbreak in Sverdlovsk (now Yekaterinburg) in the Soviet Union in 1979, sheep became ill with anthrax as far as 200 kilometers from the release point of the organism from a military facility in the southeastern portion of the city and still off limits to visitors today, see Sverdlovsk Anthrax leak).
Thus, a robust surveillance system involving human clinicians and veterinarians may identify a bioweapons attack early in the course of an epidemic, permitting the prophylaxis of disease in the vast majority of people (and/or animals) exposed but not yet ill.
For example, in the case of anthrax, it is likely that by 2436 hours after an attack, some small percentage of individuals (those with compromised immune system or who had received a large dose of the organism due to proximity to the release point) will become ill with classical symptoms and signs (including a virtually unique chest X-ray finding, often recognized by public health officials if they receive timely reports). The incubation period for humans is estimated to be about 11.8 days to 12.1 days. This suggested period is the first model that is independently consistent with data from the largest known human outbreak. These projections refines previous estimates of the distribution of early onset cases after a release and supports a recommended 60-day course of prophylactic antibiotic treatment for individuals exposed to low doses of anthrax. By making these data available to local public health officials in real time, most models of anthrax epidemics indicate that more than 80% of an exposed population can receive antibiotic treatment before becoming symptomatic, and thus avoid the moderately high mortality of the disease.
From most specific to least specific:
1. Single cause of a certain disease caused by an uncommon agent, with lack of an epidemiological explanation.
2. Unusual, rare, genetically engineered strain of an agent.
3. High morbidity and mortality rates in regards to patients with the same or similar symptoms.
4. Unusual presentation of the disease.
5. Unusual geographic or seasonal distribution.
6. Stable endemic disease, but with an unexplained increase in relevance.
7. Rare transmission (aerosols, food, water).
8. No illness presented in people who were/are not exposed to “common ventilation systems (have separate closed ventilation systems) when illness is seen in persons in close proximity who have a common ventilation system.”
9. Different and unexplained diseases coexisting in the same patient without any other explanation.
10. Rare illness that affects a large, disparate population (respiratory disease might suggest the pathogen or agent was inhaled).
11. Illness is unusual for a certain population or age-group in which it takes presence.
12. Unusual trends of death and/or illness in animal populations, previous to or accompanying illness in humans.
13. Many effected reaching out for treatment at the same time.
14. Similar genetic makeup of agents in effected individuals.
15. Simultaneous collections of similar illness in non-contiguous areas, domestic, or foreign.
16. An abundance of cases of unexplained diseases and deaths.
The goal of biodefense is to integrate the sustained efforts of the national and homeland security, medical, public health, intelligence, diplomatic, and law enforcement communities. Health care providers and public health officers are among the first lines of defense. In some countries private, local, and provincial (state) capabilities are being augmented by and coordinated with federal assets, to provide layered defenses against biological weapon attacks. During the first Gulf War the United Nations activated a biological and chemical response team, Task Force Scorpio, to respond to any potential use of weapons of mass destruction on civilians.
The traditional approach toward protecting agriculture, food, and water: focusing on the natural or unintentional introduction of a disease is being strengthened by focused efforts to address current and anticipated future biological weapons threats that may be deliberate, multiple, and repetitive.
The growing threat of biowarfare agents and bioterrorism has led to the development of specific field tools that perform on-the-spot analysis and identification of encountered suspect materials. One such technology, being developed by researchers from the Lawrence Livermore National Laboratory (LLNL), employs a “sandwich immunoassay”, in which fluorescent dye-labeled antibodies aimed at specific pathogens are attached to silver and gold nanowires.
In the Netherlands, the company TNO has designed Bioaerosol Single Particle Recognition eQuipment (BiosparQ). This system would be implemented into the national response plan for bioweapon attacks in the Netherlands.
Researchers at Ben Gurion University in Israel are developing a different device called the BioPen, essentially a “Lab-in-a-Pen”, which can detect known biological agents in under 20 minutes using an adaptation of the ELISA, a similar widely employed immunological technique, that in this case incorporates fiber optics.
Theoretically, novel approaches in biotechnology, such as synthetic biology could be used in the future to design novel types of biological warfare agents. Special attention has to be laid on future experiments (of concern) that:
Most of the biosecurity concerns in synthetic biology, however, are focused on the role of DNA synthesis and the risk of producing genetic material of lethal viruses (e.g. 1918 Spanish flu, polio) in the lab. Recently, the CRISPR/Cas system has emerged as a promising technique for gene editing. It was hailed by The Washington Post as “the most important innovation in the synthetic biology space in nearly 30 years.” While other methods take months or years to edit gene sequences, CRISPR speeds that time up to weeks. However, due to its ease of use and accessibility, it has raised a number of ethical concerns, especially surrounding its use in the biohacking space.
Read this article:
Posted: at 12:39 am
Americatoday is dominated by asystem of beliefs, attitudes and values that we have come to know as Political Correctness. For many it is an annoyance and a self parodying joke. But Political Correctness is deadly serious in its aims, seeking to impose a uniformity of thought and behavior on all Americans. It istherefore totalitarian in nature. Its roots lie in a version of Marxism which sees culture, rather than the economy, as the site of class struggle.
Under Marxist economic theory, the oppressed workers were supposed to be the beneficiaries of a social revolution that would place them on top of the power structure. When these revolutionary opportunities presented themselves, however, the workers did not respond. The Marxist revolutionaries did not blame their theory for these failures; instead theyblamed the ruling class, which had bought off the workers by giving themrights, and had blinded them with a false consciousness that led them to support national governments and liberal democracy.
One group of Marxist intellectuals resolved this apparent contradiction of Marxist theory by an analysis that focused on societys cultural superstructure rather than on the economic base as Marx did. The Italian Marxist Antonio Gramsci and Hungarian Marxist Georg Lukacs contributed the most to this new cultural Marxism.
Among Marxists, Gramsci is noted for his theory that cultural hegemony is the means to class dominance. In his view, a new Communist man had to be created through a changed culture before any political revolution was possible. This led to a focus on the efforts of intellectuals in the fields of education and media.
Georg Lukacsbelieved that for a new Marxist culture to emerge, the existing culture must be destroyed. He said, I saw the revolutionary destruction of society as the one and only solution to the cultural contradictions of the epoch….Such a worldwide overturning of values cannot take place without the annihilation of the old values and the creation of new ones by the revolutionaries.
In 1923, Lukacs and other Marxist intellectuals associated with the Communist Party of Germany founded the Institute of Social Research at Frankfurt University in Frankfurt, Germany. The Institute, which became known as the Frankfurt School, was modeled after the Marx-Engels Institute in Moscow. In 1933, when Nazis came to power in Germany, the members of the Frankfurt School fled. Most came to the United States and many became influential in American universities. The Frankfurt Schools studies combined Marxist analysis with Freudian psychoanalysis to form the basis of what became known as Critical Theory.
Critical Theory was essentially destructive criticism of the main elements of Western culture, including Christianity, capitalism, authority, the family, patriarchy, hierarchy, morality, tradition, sexual restraint, loyalty, patriotism, nationalism, heredity, ethnocentrism, convention and conservatism.
Critical Theorists recognized that traditional beliefs and the existing social structure would have to be destroyed and then replaced with a new thinking that would become as much a part of elementary consciousness as the old one had been. Their theories took hold in the tumultuous 1960s, when the Vietnam War opened a Pandoras Box of reevaluaton and revolution. The student radicals of the era were strongly influenced by revolutionary ideas, among them those of Herbert Marcuse, a member of the Frankfurt School who preach the Great Refusal, a rejection of all basic Western concepts and an embrace of sexual liberation, and the merits of feminist and black revolutions. His primary thesis was that university students, ghetto blacks, the alienated, the asocial, and the Third World could take the place of the proletariat in the coming Communist revolution.
Marcuse may be the most important member of the Frankfurt School in terms of the origins of Political Correctness, because he was the critical link to the counterculture of the 1960s. His objective was clear: One can rightfully speak of a cultural revolution, since the protest is directed toward the whole cultural establishment, including morality of existing society.
When addressing the general public, contemporary advocates of Political Correctness or Cultural Marxism, as it might just as easily be called present their beliefs with appealing simplicity as merely a commitment tobeing sensitive to other people and embracing values such as tolerance and diversity. The reality is different. Political Correctness is the use of culture as a sharp weapon to enforce new norms and to stigmatize those who dissent from the new dispensation; to stigmatize those whoinsist on values that will impede the new “PC”regime: free speech and free and objective intellectual inquiry.
Adapted from: “Political Correctness”: A Short History of an Ideology,” edited by William Lind (November 2004).
Here is the original post:
Posted: at 12:39 am
Michael Snyder American Dream August 14, 2013
If you say the wrong thing in America today, you could be penalized, fired or even taken to court. Political correctness is running rampant, and it is absolutely destroying this nation.
In his novel1984, George Orwell imagined a future world where speech was greatly restricted.
He called that the language that the totalitarian state in his novel created Newspeak, and it bears a striking resemblance to the political correctness that we see in America right now.
According to Wikipedia, Newspeak is a reduced language created by thetotalitarianstate as a tool to limitfree thought, and concepts that pose a threat to the regime such as freedom, self-expression,individuality, peace, etc. Any form of thought alternative to the partys construct is classified as thoughtcrime.
Yes, people are not usually being hauled off to prison for what they are saying just yet, but we are heading down that path.
Every single day, the mainstream media in the United States bombards us with subtle messages about what we should believe and what appropriate speech consists of.
Most of the time, most Americans quietly fall in line with this unwritten speech code.
In fact, most of the time we enforce this unwritten speech code among each other. Those that would dare to buck the system are finding out that the consequences can be rather severe.
The following are 19 shocking examples of how political correctness is destroying America
#1The Missouri State Fair has permanently banned a rodeo clown from performing just because he wore an Obama mask, and now all of the other rodeo clowns are being required to take sensitivity training
But the state commission went further, saying it will require that before the Rodeo Cowboy Association can take part in any future state fair, they must provide evidence to the director of the Missouri State Fair that they have proof that all officials and subcontractors of the MRCA have successfully participated in sensitivity training.
#2Government workers in Seattle have been told that they should no longer use the words citizen and brown bag because they arepotentially offensive.
#3A Florida police officer recentlylost his jobfor calling Trayvon Martin a thug on Facebook.
#4Climate change deniers are definitely not wanted at the U.S. Department of the Interior. Interior Secretary Sally Jewellwas recently quotedas making the following statement: I hope there are no climate-change deniers in the Department of Interior.
#5A professor at Ball State University was recently banned from even mentioning the concept of intelligent design because it would supposedly violate the academic integrity of the course that he was teaching.
#6The mayor of Washington D.C. recently asked singer Donnie McClurkinnot to attend his own concertbecause of his views on homosexuality.
#7U.S. Senator Chuck Schumer is calling on athletes marching in the opening ceremonies at the Winter Olympics in Sochi next year to embarrass Russian President Vladimir Putin by protesting for gay rights.
Advertisement ProPur. Gravity filtration is the best way to purify your water.
#8Chaplains in the U.S. militaryare being forcedto perform gay marriages, even if it goes against their personal religious beliefs. The few chaplains that have refused to follow orders know that it means the end of their careers.
#9The governor of Californiahas signed a bill into lawwhich will allow transgendered students to use whatever bathrooms and gym facilities that they would like
Transgendered students in California will now have the right to use whichever bathrooms they prefer and join either the boys or girls sports teams, thanks to landmark legislation signed by Democratic Gov. Jerry Brown on Monday.
The lawamendsthe states education code, and stipulates that each student will have access to facilities, sports teams, and programs that are consistent with his or her gender identity, rather than the students actual biological composition. A male student who self-identifies as female could therefore use the girls bathroom, even if he is anatomically male.
#10In San Francisco, authorities have installed small plastic privacy screens on library computers so that perverts can continue to exercise their right to watch pornography at the library without children being directly exposed to it.
#11In America today, there are many groups that are absolutely obsessed with eradicating every mention of Godout of the public sphere. For example, an elementary school in North Carolina ordered a little six-year-old girlto remove the word Godfrom a poem that she wrote to honor her two grandfathers that had served in the Vietnam War.
#12A high school track team was disqualified earlier this year because one of the runners made a gesture thanking God once he had crossed the finish line.
#13Earlier this year, a Florida Atlantic University student that refused to stomp on the name of Jesuswas banned from class.
#14A student at Sonoma State University was ordered to take off a cross that she was wearing because someone could be offended.
#15A teacher in New Jerseywas firedfor giving his own Bible to a student that did not own one.
#16Volunteer chaplains for the Charlotte-Mecklenburg Police Departmenthave been bannedfrom using the name of Jesus on government property.
#17According to a new Army manual, U.S. soldiers will now be instructed to avoid any criticism of pedophilia and to avoid criticizing anything related to Islam. The following is from aJudicial Watch article
The draft leaked to the newspaper offers a list of taboo conversation topics that soldiers should avoid, including making derogatory comments about the Taliban, advocating womens rights, any criticism of pedophilia, directing any criticism towards Afghans, mentioning homosexuality and homosexual conduct or anything related to Islam.
#18The Obama administrationhas bannedall U.S. government agencies from producing any training materials that link Islam with terrorism. In fact, the FBI has gone back and purged references to Islam and terrorismfrom hundreds of old documents.
#19According to the Equal Employment Opportunity Commission, it is illegal for employers to discriminate against criminals because it has a disproportionate impact on minorities.
It would be hard to overstate the power that all of this relentless thought training has on all of us.
And young people are particularly susceptible to the power of suggestion.
If you doubt this, just check out this video of a little boy praying to Barack Obamaas if he was a deity
It would be a huge mistake to underestimatethe power of the mainstream mediain America today.
As I mentionedthe other day, Americans watch an average of about 153 hours of television a month.
When Americans go to work or go to school, the conversations that they have with others are mostly based on content that the media feeds them.
And about 90 percent of what we watch on television is controlled by just six gigantic corporations.
But the media is not the only source that is telling us what to think.
The truth is that the messaging that comes from all of our major institutions (the government, the media, the education system, etc.) is remarkably consistent.
establishment wants to control what we say and how we think, and they have a relentless propaganda machine that never stops working.
The way that we all see the world has been greatly shaped by the thousands of hours of thought training that we have all received over the years. Understanding what is being done to us is the first step toward breaking free.