CEO Assassin May Have Used ‘Covert-Type’ Weapon – Took Greyhound Bus To NYC Last Month

CEO Assassin May Have Used 'Covert-Type' Weapon - Took Greyhound Bus To NYC Last Month

CEO Assassin May Have Used ‘Covert-Type’ Weapon – Took Greyhound Bus To NYC Last Month

The NYPD’s principal “person of interest” in the assassination of UnitedHealthcare CEO Brian Thompson arrived in Manhattan late last month after a long bus ride from Atlanta — then stayed at a hostel ahead of Tuesday’s shocking act, law enforcement sources tell various outlets. Many more details are piling up — from the remarkable weapon cops think he used to the type of pricey backpack he seems to have ditched in Central Park — but there’s still no name to go with the smiling face captured by the hostel’s front-desk security camera.  

The person of interest in the assassination of UnitedHealthcare’s CEO revealed his face as he flirted with a female employee of the hostel where he stayed (NYPD)

Police say the man arrived in New York City on Nov. 24 — the Sunday before Thanksgiving — stepping off a Greyhound bus at the Port Authority bus terminal in Manhattan around 9pm. That particular bus route originates in Atlanta. Some reports say police don’t yet know where he boarded the coach, while others indicate investigators believe he was aboard from the start of the nearly 900-mile journey from Atlanta to New York, which can take 20 hours or more on Greyhound.  

Police sources say he then checked into the HI New York City Hostel  at Amsterdam Avenue and West 103rd Street, on the Upper West Side near Central Park. The revelation of his face appears to have come during a flirtatious moment of weakness as he interacted with a woman working the hostel’s front desk, lowering his mask to beam at her across the desk. The suspect left the hostel on Friday, Nov. 29, only to return via Uber to check back in the very next day.  

The suspect is believed to have stayed at the HI New York City Hostel on Manhattan’s Upper West Side 

He reportedly used a bogus New Jersey driver’s license to book his stays at the hostel, where he roomed with two apparent strangers. “That’s not clever, because there is recording, video all over the place,” John Nielsen, a visitor from Denmark who’s been staying at the hostel for the past week, told the Times.  

The suspect shared a hostel room like this one with two other people, whom police believe were strangers to him (via HI New York City Hostel)

Police have taken keen interest in a gun sale in Connecticut — involving a highly-uncommon weapon that appears similar to the one seen in the video of the killing. “It’s a covert-type weapon. It is not sold widely,” said CBS News law enforcement contributor Rich Esposito. “They’ll go to the dealers of that gun and try to establish if they know who this person is.” 

Police believe the killer used a B&T Station SIX-9 (“Silenced Project caliber 9”), which retails for around $2,100 

According to CBS News, police believe the murder weapon is a B&T Station SIX-9, which comes equipped with a sound-suppressor and retails for around $2,100. Note carefully how B&T describes its latest version: 

This updated, integrally suppressed pistol features a new grip and updated magazines, yet maintains its non-descript appearance, whisper-quiet sound signature and unique rotating bolt operation. This model in 9mm wears a 3-in. barrel. It finds its operational success as a magazine-fed, non-auto-ejecting single-shot functioning in a rotational bolt action. It is beautifully enhanced by wipe suppressor, and a baffled suppressor is an available option for those who prefer that design. 

The “non-auto-ejecting single-shot functioning” is consistent with what’s seen in the video of the shooting, as the assassin manipulates the pistol after firing each shot — something that both casual observers and experts had widely attributed to the pistol malfunctioning. Here’s how the operation of the Station SIX looks with the 45-caliber version: 

The suspect shot the 50-year-old Thompson — who was arriving at the New York Hilton Midtown for an investors’ meeting at 6:45 am — in the back and leg before leaving first by foot, then using an e-bike that he rode through Central Park. Police think he exited the park at West 77th Street — minus the backpack he wore during the killing and as he rolled into the park.

via New York Post 

Some internet sleuths think they’ve figured out the make and model of that backpack — concluding it’s an Everyday Backpack sold by Peak Designs between 2016 and 2019, TMZ reports. It’s not cheap: Marketed for use by photographers but also used by others, the latest version goes for about $250.  

Internet sleuths think the shooter was wearing a backpack model that retails for hundreds of dollars (via TMZ)

Investigators recovered 9mm shell casings and live rounds at the shooting that were adorned with the words “deny,” “defend” and “depose,” written carefully with a sharpieThose words are open to interpretation, but many are pointing to their similarity to the title of Jay Feinman’s book, Delay Deny Defend: Why Insurance Companies Don’t Pay Claims And What You Can Do About It.” Given that, police are looking for people who may have reason for outrage at an individual coverage decision rendered by the health insurance giant. That could be quite a long list of people: Recent data from Lending Tree shows UnitedHealthcare has some of the highest claim denial rates of any US insurance company —  a jarring 32% compared to 17% for Blue Cross Blue Shield. (They may also want to talk to former Washington Post writer Taylor Lorenz.) 

There are many more clues undergoing intense police scrutiny. Less than a half-hour before murdering Thompson, the suspect used cash to buy drinks and snacks at a Starbucks near the ambush site. Police think they’ve obtained a water bottle and candy wrapper he left at the store, along with a coffee cup he may have drank from. They also found a cell phone in the alleyway that comprised part of his getaway route — a route that, at least this far along, has proven quite effective. 

However, his flirty smile at a female hostel clerk and choice of a highly uncommon pistol may prove to be his undoing… 

Tyler Durden
Fri, 12/06/2024 – 06:55

Underwater Geopolitics

Underwater Geopolitics

Underwater Geopolitics

Authored by Carlo J.V.Caro via RealClearWire.com,

How China’s Control of Undersea Cables and Data Flows Reshapes Global Power

Cable Routing Protocols

The rapid construction of undersea cables has brought a hidden but crucial issue into focus: the manipulation of the protocols that control how data travels beneath the sea. These protocols determine the pathways internet data takes, influencing speed, costs, and even exposure to surveillance. Even small changes in these pathways can tilt the global balance of digital power. China’s increasing role in this area demonstrates how technology can be used strategically to reshape geopolitics.

At the heart of this issue is a technology called Software-Defined Networking (SDN). SDN allows data traffic to be managed and optimized in real time, improving efficiency. But this same flexibility makes SDN vulnerable to misuse. Chinese tech companies like HMN Tech (formerly Huawei Marine Networks), ZTE, and China Unicom are leading the way in SDN development. China also holds sway in international organizations that set the rules for these technologies, such as the International Telecommunication Union (ITU) and the Institute of Electrical and Electronics Engineers (IEEE). This influence gives China a hand in shaping global standards and governance.

Africa illustrates how this influence plays out. Chinese investments in digital infrastructure across the continent are massive. For example, the PEACE (Pakistan and East Africa Connecting Europe) cable, which links East Africa to Europe, was designed to avoid Chinese territory. Yet, thanks to SDN technology, its traffic can still be redirected through Chinese-controlled points. This redirection could introduce delays of 20 to 30 milliseconds per hop—not much for casual browsing, but a serious issue for latency-sensitive activities like financial trading or encrypted communication.

In Southeast Asia, similar risks are evident. The Southeast Asia-Japan Cable (SJC), which connects Singapore to Japan, relies on several landing stations influenced by China. During a period of heightened tensions in the South China Sea, some data intended for Japan was mysteriously routed through Hainan Island, under Chinese jurisdiction. Such cases suggest technical routing decisions may sometimes have political motivations.

These examples are part of a broader strategy. By exploiting SDN, China can turn submarine cables into tools for surveillance and control. Data traffic from Africa or Southeast Asia destined for Europe could be secretly rerouted through Shanghai or Guangzhou, exposing it to China’s advanced surveillance techniques like deep packet inspection. This threat extends to cloud computing, as major providers such as Amazon Web Services (AWS), Microsoft Azure, and Alibaba Cloud rely on undersea cables. With SDN, Chinese cloud providers—aligned with state interests—could redirect sensitive inter-cloud traffic, putting critical communications at risk.

Manipulating global data routes gives any actor significant geopolitical power. For instance, in a crisis, China could degrade or even sever internet connectivity for rival nations. In the Taiwan Strait, this could isolate Taiwan from global markets, disrupting financial transactions and trade. In Africa, where Huawei has built a significant portion of the continent’s telecommunications infrastructure—reportedly constructing around 70 percent of 4G networks—there is concern that this reliance could create vulnerabilities. If political tensions were to arise, China could cause slowdowns or disruptions to reinforce dependence, making countries more vulnerable in political standoffs.

The numbers highlight the stakes. Submarine cables carry 99 percent of international data traffic—over 1.1 zettabytes annually. Significant portions of intra-Asia-Pacific data flows pass through key submarine cable landing stations, including Hong Kong, which is under Chinese jurisdiction. With Chinese firms increasingly involved in substantial global submarine cable projects—such as those undertaken by HMN Technologies—Beijing’s influence over the internet’s physical backbone is growing.

The economic impact of internet disruptions on highly connected economies is substantial. For instance, the NetBlocks Cost of Shutdown Tool (COST) estimates the economic impact of internet disruptions using indicators from the World Bank, ITU, Eurostat, and the U.S. Census. According to data presented by Atlas VPN, based on NetBlocks’ COST tool, a global internet shutdown for one day could result in losses of about $43 billion, with the United States and China accounting for nearly half of this sum. Additionally, Deloitte has estimated that for a highly internet-connected country, the per-day impact of a temporary internet shutdown would be on average $23.6 million per 10 million population.

A deliberate attack on routing protocols could cause widespread financial and operational chaos. In today’s interconnected world, where digital infrastructure underpins economic stability, the ability to manipulate undersea cable traffic represents a subtle but powerful geopolitical weapon.

Addressing this threat goes beyond simply building more cables. It requires rethinking how routing protocols are governed. Transparent global standards must ensure no single country or company can dominate these systems. Routine independent audits should be conducted to detect anomalies that may signal interference. Efforts like the European Union’s Global Gateway initiative and Japan’s Digital Partnership Fund must focus on creating alternative routes to reduce reliance on Chinese-controlled nodes.

This issue highlights a new reality in global politics: control over data flows is becoming a key form of power. While most attention has been on building physical infrastructure, the quiet manipulation of routing protocols marks an equally profound shift in global influence. To protect the integrity of the internet, the world must act decisively at both technical and governance levels.

Fiber-Optic Cable Repair Networks

China’s disproportionate control over fiber-optic cable repair networks reveals potential vectors for intelligence dominance, coercive leverage, and disruption of digital sovereignty. Globally, an estimated 60 dedicated cable repair ships service the planet’s 1.5 million kilometers of submarine cables. China controls a substantial percentage of the fleet, including ships operated by state-affiliated enterprises like Shanghai Salvage Company and China Communications Construction Group. In contrast, the United States and its allies maintain a small patchwork fleet, mostly concentrated in the North Atlantic and lacking coverage in the Indo-Pacific, where over 50 percent of global internet traffic routes through key subsea cables.

China’s fleet is heavily concentrated in the South and East China Seas, regions critical to global connectivity due to chokepoints like the Singapore Strait and the Luzon Strait. With maritime exclusivity bolstered by China’s claims in disputed waters, its repair ships have nearly unrestricted access to monitor, repair, or potentially tamper with cables under the guise of routine maintenance.

Repair missions involve exposing critical cable infrastructure, including repeaters, amplifiers, and branch units—hardware that boosts signal strength over long distances but also represents points of vulnerability. Chinese vessels are equipped with advanced robotic submersibles and precision cutting-and-splicing technologies, designed for repairs but capable of installing signal interception devices. Such tools could include optical fiber taps capable of harvesting unencrypted metadata or capturing latency patterns to infer sensitive traffic flow.

China’s advancements in photonics and quantum communication technologies underscore its capacity to exploit these vulnerabilities. The Chinese Academy of Sciences has reported significant breakthroughs in quantum key distribution (QKD) systems, raising the possibility of developing quantum-based methods to crack encrypted data intercepted during repairs. Integration of AI-driven data sorting tools could automate the extraction and classification of intercepted information, rendering bulk data acquisition during repairs a strategic advantage.

The high seas, where many repair operations occur, are governed by fragmented international frameworks like the United Nations Convention on the Law of the Sea (UNCLOS), which inadequately regulate activities involving critical infrastructure. The International Cable Protection Committee (ICPC) provides voluntary guidelines for repair operations, but enforcement mechanisms are weak, leaving the system vulnerable to exploitation by state actors.

Repair missions are often classified as “emergency operations,” requiring expedited approvals that bypass detailed oversight. In one case, a cable break in the South China Sea in 2021 prompted Chinese repair ships to operate without transparency for over three weeks, raising concerns about potential covert activities. These incidents are rarely reported, as they fall outside the jurisdiction of most maritime monitoring bodies.

The lack of countermeasures by the United States and its allies amplifies the risks posed by China’s dominance. The U.S. Navy operates no specialized repair ships, relying on private operators like Global Marine Group, whose fleet is aging and ill-equipped for operations in contested waters. This contrasts with China’s state-backed model, integrating its repair fleet into broader maritime networks, providing dual-use functionality for civilian and military objectives.

The financial model of undersea cable operations further constrains Western responses. Submarine cables are predominantly privately owned, with firms like Google, Meta, and Amazon investing heavily in infrastructure but lacking incentives to prioritize geopolitical considerations. This privatization leaves strategic gaps in surveillance and monitoring, as governments must negotiate access to privately controlled repair missions.

To mitigate China’s strategic advantage, a multipronged response is essential. The United States and its allies must develop state-owned or state-subsidized repair fleets to operate in contested regions like the South China Sea and Indian Ocean. Enhanced maritime surveillance systems, such as underwater drones and sonar-based monitoring arrays, should be deployed to track repair ship movements in real time.

Revising international frameworks by expanding ICPC mandates to include mandatory reporting of repair operations could curb opacity. Collaboration with regional partners, particularly nations in the Quad (Australia, India, Japan, and the United States), could bolster collective maritime domain awareness and create redundancies in cable repair capabilities.

Maritime Data Through Automated Vessel Tracking

China’s exploitation of automated vessel tracking systems exemplifies a sophisticated component of its global digital strategy. At the heart of this initiative lies the Automatic Identification System (AIS), a maritime safety technology mandated by the International Maritime Organization (IMO) for vessels exceeding 300 gross tons engaged in international trade. While originally intended to improve navigational safety by broadcasting vessel identities, locations, courses, and cargo details, AIS has been effectively repurposed by Beijing into a dual-use asset that supports both economic intelligence gathering and military surveillance.

Chinese firms, including the BeiDou Navigation Satellite System and Alibaba Cloud, have developed advanced platforms that aggregate AIS transmissions from shipping lanes worldwide. These platforms integrate AIS data with artificial intelligence-driven predictive analytics, enabling Beijing to monitor and analyze global maritime chokepoints such as the Strait of Malacca, the Panama Canal, and the Suez Canal—key arteries of international commerce. By doing so, China gains critical insights into global shipping patterns, strategic trade routes, and supply chain dynamics. As of 2023, the global merchant fleet comprised around 60,000 ships.

During the 2021 Suez Canal blockage, Chinese logistics firms, leveraging real-time AIS data, rapidly identified alternative routes through the Arctic and along the Indian Ocean, allowing Chinese exporters to reroute goods while Western competitors faced delays. Similarly, in the Strait of Malacca, a waterway facilitating the transit of over 16 million barrels of oil daily and 40 percent of global trade, Chinese analysts have used AIS data to optimize resource flow, preempt congestion, and study vulnerabilities in energy supply routes.

AIS data plays a pivotal role in China’s military strategy, especially in the Indo-Pacific. By combining AIS information with satellite imagery and data from undersea acoustic arrays, China has established a surveillance network capable of tracking naval deployments with precision. AIS data has been used to monitor patrol patterns of the U.S. Navy’s Seventh Fleet, revealing that over a third of its South China Sea operations in 2022 followed predictable routes. This surveillance allows the People’s Liberation Army Navy (PLAN) to anticipate U.S. Freedom of Navigation Operations (FONOPs) and position its assets accordingly.

China’s manipulation of AIS extends to conflict simulations and asymmetric warfare. During military exercises near Taiwan in 2023, Chinese forces reportedly deployed unmanned surface vessels programmed to mimic civilian AIS signals, complicating the identification of hostile assets.

Through its Digital Silk Road initiative, Beijing has exported various forms of maritime technologies that incorporate Automatic Identification System (AIS) capabilities. China often provides financial incentives to promote the adoption of its technologies abroad, which may enhance its access to regional maritime data. This asymmetry grants China an informational advantage and risks reshaping maritime transparency norms in its favor.

Rare Subsea Mapping Data

China’s increasing investment in subsea mapping has positioned it as a significant player in oceanographic intelligence, impacting scientific, commercial, and military domains. China has been actively mapping its claimed maritime territories using state-funded research vessels and autonomous systems. These efforts contribute to international initiatives like the Nippon Foundation-GEBCO Seabed 2030 project, which aims to map the entire global seabed by 2030 and had mapped approximately 23.4 percent as of June 2022 with international contributions. China’s activities extend to strategic regions in the Indo-Pacific, the Arctic, and the Indian Ocean, raising concerns over the dual-use potential of its data collection.

Subsea mapping data is critical for submarine cable routing, undersea infrastructure development, and naval operations. China’s repository of high-resolution bathymetric maps—including surveys of key chokepoints like the Strait of Malacca and the Bashi Channel—provides a tactical edge. These chokepoints are vital for global trade and serve as strategic naval passages for power projection and anti-access/area-denial operations. The People’s Liberation Army Navy uses seabed data to optimize the placement of undersea sensor arrays, critical for its “Great Underwater Wall” initiative, integrating hydroacoustic monitoring to detect foreign submarines.

China’s advancements in autonomous underwater vehicles (AUVs) enhance its capabilities. In 2021, the Hailong III and Qianlong II AUVs were deployed for deep-sea mapping missions in the South China Sea, gathering data at depths over 6,000 meters. These AUVs have multi-beam sonar systems achieving sub-meter resolution, surpassing commercial standards. Their ability to operate autonomously over long durations allows China to map intricate undersea topographies critical for resource exploration and undersea warfare.

China has used seabed mapping as a diplomatic tool to extend influence over smaller nations. Through its Maritime Silk Road Initiative, Beijing has signed agreements with over 20 countries, granting Chinese research vessels access to Exclusive Economic Zones (EEZs). Between 2015 and 2022, Chinese expeditions in Pacific Island nations’ EEZs often involved dual-use mapping activities.

In 2019, the Chinese survey vessel Haiyang Dizhi 8 conducted seismic surveys near the Vanguard Bank within Vietnam’s Exclusive Economic Zone (EEZ), collecting bathymetric data that aligns with key undersea routes potentially useful for submarine operations. This incursion led to a tense standoff with Vietnam, drawing international criticism over China’s assertive actions and raising concerns about the dual-use potential of the data collected. Similarly, in 2018, China’s proposed involvement in undersea cable projects connecting Papua New Guinea and the Solomon Islands through Huawei Marine raised significant security concerns. Fearing risks to the security of undersea communication cables and potential espionage, Australia intervened by funding and undertaking the projects themselves, highlighting apprehensions about granting Chinese entities access to critical seafloor data in the region.

China’s seabed mapping strategy has significant military implications, particularly in the South China Sea. In this region, where China has constructed artificial islands such as Fiery Cross Reef, Subi Reef, and Mischief Reef, high-resolution seabed data enables precise deployment of missile systems, naval patrols, and underwater drones. Detailed seabed mapping supports the construction and fortification of these islands, allowing for the installation of surface-to-air missiles, anti-ship cruise missiles, and the operation of military airstrips. Additionally, China’s deployment of unmanned underwater vehicles like the Sea Wing (Haiyi) gliders enhances their ability to collect oceanographic data crucial for submarine navigation and anti-submarine warfare. These activities have raised concerns among neighboring countries and the international community about the dual-use potential of China’s maritime endeavors and their impact on regional security.

By controlling seabed mapping data, China influences submarine cable networks, which carry 95 percent of global internet traffic and $10 trillion in daily financial transactions. China’s involvement in projects like the South Pacific Cable Project through state-owned China Mobile led to concerns over data interception capabilities. Its presence in Arctic seabed mapping, facilitated by icebreaker vessels like Xuelong 2, underscores ambitions to secure alternative maritime routes and resources under the guise of scientific research.

China’s approach to subsea mapping data has raised concerns about transparency and shared access in the global community. While international initiatives like the Seabed 2030 Project encourage open sharing of ocean floor data to advance scientific research and environmental understanding, China has been criticized for not fully sharing the extensive seabed data it collects. For example, much of the data gathered by Chinese vessels in international waters is not readily available in global databases like those managed by the International Hydrographic Organization (IHO) or the General Bathymetric Chart of the Oceans (GEBCO). This selective sharing limits other nations’ ability to leverage valuable information and contrasts with global norms promoting cooperation and transparency in oceanographic research.

Tyler Durden
Thu, 12/05/2024 – 23:25

These Are The Best (And Worst) American Cities For Economic Mobility

These Are The Best (And Worst) American Cities For Economic Mobility

These Are The Best (And Worst) American Cities For Economic Mobility

Behold – the American dream.

Where a fair and equal society allows anyone the ability to fashion the life they want, providing they’re willing to work for it.

A cornerstone of that dream is that each generation does better than the last, building and benefiting from growing economic opportunities.

But this does not necessarily hold true for all Americans.

This chart, via Visual Capitalist’s Pallavi Rao, compares the real household income of 27-year-olds from two generations: those born in 1978 and those born in 1992, both raised by low-income parents. All figures are in 2023 dollars.

ℹ️ 27 is the earliest age at which estimates of adult incomes can be measured. Only the 50 largest metros were considered in this analysis. Low-income is categorized by percentile groups.

A positive percentage change implies economic mobility, allowing us to see the cities where adults had a chance to better their circumstances, and to what extent.

Data is sourced from a study conducted by Opportunity Atlas in partnership with the Census Bureau.

Where is the American Dream Still Alive?

Southern cities in Texas, Tennessee, and North Carolina did see upward mobility between generations in the lowest income group, with real wages improving 5-7%.

For example, in Brownsville, Texas, those born to low-income parents in 1992 earned an average of $33,000 at age 27. This is around $2,000 more than their 1978-born peers at the same age, the highest increase across all 50 metro areas.

In contrast, Philadelphia, Pennsylvania, saw real incomes decline across generations. The 1978 cohort earned a similar salary to their peers in Brownsville ($31,200), but a generation later, incomes dropped to $27,200.

In fact, only 12 of the 50 saw real income growth across generations for this economic class. And five of them were in Texas. This means that in 38 cities real wages fell between generations.

Zooming out, the average household income at 27 across the nation (for those born to low-income parents) dropped by 4%.

This class difference is important. Because when looking at the highest income percentile, the average income between generations increased 5%.

Wondering where wages adjusted for the cost of living are the highest in the country? Check out Mapped: Median Income by State for a quick overview.

Tyler Durden
Thu, 12/05/2024 – 18:00

Impoundment, For Lack Of A Better Word, Is Good

Impoundment, For Lack Of A Better Word, Is Good

Impoundment, For Lack Of A Better Word, Is Good

Via the Issues & Insights Editorial Board,

If you’ve never heard the word “impoundment” before, you will – often – next year. And for good reason. Because this battle will determine whether government spending can ever be brought under control.

Last year, President-elect Donald Trump said that “For 200 years under our system of government, it was undisputed that the president had the constitutional power to stop unnecessary spending through what is known as impoundment.”

Since he’s been elected, he’s given every indication that he intends to reclaim this power. Indeed, the success of his “Department of Government Efficiency” run by Elon Musk and Vivek Ramaswamy depends heavily on Trump being able to spend less than Congress appropriates.

This, of course, has the left freaking out. The grumblers say that Trump’s refusing to spend money Congress has authorized would be “unprecedented” and “a devastating power grab” that would “flip the power of the purse” and give Trump “authoritarian control” over the government.

There are just two big problems with these assertions. The first is that presidential impoundment dates back to the very beginnings of the nation. The second is that letting presidents impound funds appears to have been an effective tool for keeping federal spending under control.

Impoundment is just a jargony word for instances where Congress appropriates a certain amount of money for a program in a given year, and the president refuses to spend all of it.

A research paper published by the Center for Renewing America (CRA) provides a long and detailed historical account of impoundment, including its roots in English law and its use by presidents – Democrats and Republicans – throughout the nation’s history.  

Thomas Jefferson impounded funds. So did Madison, Buchanan, and Grant.

Herbert Hoover, the CRA paper notes, “vigorously employed the impoundment power to decrease government spending in the midst of the Great Depression.” FDR “refused to spend more than $500 million in public works funds on policy grounds.” Lyndon Johnson would “withhold appropriations that exceeded the president’s budget.”

Even Trump-hating CNN admits that impoundment “occurred frequently in U.S. history, beginning in 1803 when Thomas Jefferson declined to buy gunboats to patrol the Mississippi as he negotiated the Louisiana Purchase with France.”

While the Constitution forbids the president from spending more money than Congress has appropriated, there’s nothing in the Constitution that forbids the president from spending less.

And lo and behold, the nation survived and thrived for nearly 200 years while the president had this authority.

It wasn’t until 1974 that Congress stripped the president’s ability to impound funds. That year, lawmakers used the Watergate scandal and President Richard Nixon’s aggressive use of impoundment as an excuse to pass the Impoundment Control Act. The law also created the Congressional Budget Office and the budget committees in the House and Senate, and “reasserted Congress’ power of the purse,” according to Democrats on the House Budget Committee.

Well, what happened after Congress reasserted its power? Look at the two charts below.

The first shows annual budget deficits as a share of GDP. The second shows the national debt as a share of GDP.

What do you see? In 1974, significant annual deficits became the norm. From 1947 to 1974, the federal deficit averaged 0.4% of GDP. Since 1974, deficits have averaged 3.8% of GDP. They’ve been close to 6% for President Joe Biden’s entire time in office. (Negative numbers in the chart are years when the government ran a surplus.)

The nation’s debt, which had been trending downward as World War II debts were paid off, suddenly stopped declining in 1974. It’s been climbing fairly steadily ever since.

Trump is likely to challenge the Impoundment Control Act as unconstitutional. We hope he does, and that he succeeds, or at the very least forces Congress to fix that law.

Because letting Congress have unlimited authority to set a floor on spending has been a fiscal disaster.

— Written by the I&I Editorial Board

If you like what you see, feel free to visit our Donations Page by clicking here. And be sure to tell your friends!

Tyler Durden
Thu, 12/05/2024 – 06:30

You’d Better Watch Out: The Surveillance State Is Making A List, And You’re On It

You'd Better Watch Out: The Surveillance State Is Making A List, And You're On It

You’d Better Watch Out: The Surveillance State Is Making A List, And You’re On It

Authored by John & Nisha Whitehead via The Rutherford Institute,

“He sees you when you’re sleeping

He knows when you’re awake

He knows when you’ve been bad or good

So be good for goodness’ sake!”

—“Santa Claus Is Coming to Town”

You’d better watch out—you’d better not pout—you’d better not cry—‘cos I’m telling you why: this Christmas, it’s the Surveillance State that’s making a list and checking it twice, and it won’t matter whether you’ve been bad or good.

You’ll be on this list whether you like it or not.

Mass surveillance is the Deep State’s version of a “gift” that keeps on giving…back to the Deep State.

Geofencing dragnets. Fusion centers. Smart devices. Behavioral threat assessments. Terror watch lists. Facial recognition. Snitch tip lines. Biometric scanners. Pre-crime. DNA databases. Data mining. Precognitive technology. Drones. Contact tracing apps. License plate readers. Social media vettingSurveillance towers.

What these add up to is a world in which, on any given day, the average person is now monitored, surveilled, spied on and tracked in more than 20 different ways by both government and corporate eyes and ears.

Big Tech wedded to Big Government has become Big Brother.

Every second of every day, the American people are being spied on by a vast network of digital Peeping Toms, electronic eavesdroppers and robotic snoops.

This creepy new era of government/corporate spying—in which we’re being listened to, watched, tracked, followed, mapped, bought, sold and targeted—has been made possible by a global army of techno-tyrants, fusion centers and Peeping Toms.

Consider just a small sampling of the tools being used to track our movements, monitor our spending, and sniff out all the ways in which our thoughts, actions and social circles might land us on the government’s naughty list, whether or not you’ve done anything wrong.

Tracking you based on your phone and movements: Cell phones have become de facto snitches, offering up a steady stream of digital location data on users’ movements and travels. For instance, the FBI was able to use geofence data to identify more than 5,000 mobile devices (and their owners) in a 4-acre area around the Capitol on January 6. This latest surveillance tactic could land you in jail for being in the “wrong place and time.” Police are also using cell-site simulators to carry out mass surveillance of protests without the need for a warrant. Moreover, federal agents can now employ a number of hacking methods in order to gain access to your computer activities and “see” whatever you’re seeing on your monitor. Malicious hacking software can also be used to remotely activate cameras and microphones, offering another means of glimpsing into the personal business of a target.

Tracking you based on your DNA. DNA technology in the hands of government officials completes our transition to a Surveillance State. If you have the misfortune to leave your DNA traces anywhere a crime has been committed, you’ve already got a file somewhere in some state or federal database—albeit it may be a file without a name. By accessing your DNA, the government will soon know everything else about you that they don’t already know: your family chart, your ancestry, what you look like, your health history, your inclination to follow orders or chart your own course, etc. After all, a DNA print reveals everything about “who we are, where we come from, and who we will be.” It can also be used to predict the physical appearance of potential suspects. It’s only a matter of time before the police state’s pursuit of criminals expands into genetic profiling and a preemptive hunt for criminals of the future.

Tracking you based on your face: Facial recognition software aims to create a society in which every individual who steps out into public is tracked and recorded as they go about their daily business. Coupled with surveillance cameras that blanket the country, facial recognition technology allows the government and its corporate partners to identify and track someone’s movements in real-time. One particularly controversial software program created by Clearview AI has been used by police, the FBI and the Department of Homeland Security to collect photos on social media sites for inclusion in a massive facial recognition database. Similarly, biometric software, which relies on one’s unique identifiers (fingerprints, irises, voice prints), is becoming the standard for navigating security lines, as well as bypassing digital locks and gaining access to phones, computers, office buildings, etc. In fact, greater numbers of travelers are opting into programs that rely on their biometrics in order to avoid long waits at airport security. Scientists are also developing lasers that can identify and surveil individuals based on their heartbeats, scent and microbiome.

Tracking you based on your behavior: Rapid advances in behavioral surveillance are not only making it possible for individuals to be monitored and tracked based on their patterns of movement or behavior, including gait recognition (the way one walks), but have given rise to whole industries that revolve around predicting one’s behavior based on data and surveillance patterns and are also shaping the behaviors of whole populations. One smart “anti-riot” surveillance system purports to predict mass riots and unauthorized public events by using artificial intelligence to analyze social media, news sources, surveillance video feeds and public transportation data.

Tracking you based on your spending and consumer activities: With every smartphone we buy, every GPS device we install, every X/Twitter, Facebook, and Google account we open, every frequent buyer card we use for purchases—whether at the grocer’s, the yogurt shop, the airlines or the department store—and every credit and debit card we use to pay for our transactions, we’re helping Corporate America build a dossier for its government counterparts on who we know, what we think, how we spend our money, and how we spend our time. Consumer surveillance, by which your activities and data in the physical and online realms are tracked and shared with advertisers, has become big business, a $300 billion industry that routinely harvests your data for profit. Corporations such as Target have not only been tracking and assessing the behavior of their customers, particularly their purchasing patterns, for years, but the retailer has also funded major surveillance in cities across the country and developed behavioral surveillance algorithms that can determine whether someone’s mannerisms might fit the profile of a thief.

Tracking you based on your public activities: Private corporations in conjunction with police agencies throughout the country have created a web of surveillance that encompasses all major cities in order to monitor large groups of people seamlessly, as in the case of protests and rallies. They are also engaging in extensive online surveillance, looking for any hints of “large public events, social unrest, gang communications, and criminally predicated individuals.” Defense contractors have been at the forefront of this lucrative market. Fusion centers, $330 million-a-year, information-sharing hubs for federal, state and law enforcement agencies, monitor and report such “suspicious” behavior as people buying pallets of bottled water, photographing government buildings, and applying for a pilot’s license as “suspicious activity.”

Tracking you based on your social media activities: Every move you make, especially on social media, is monitored, mined for data, crunched, and tabulated in order to form a picture of who you are, what makes you tick, and how best to control you when and if it becomes necessary to bring you in line. As The Intercept reported, the FBI, CIA, NSA and other government agencies are increasingly investing in and relying on corporate surveillance technologies that can mine constitutionally protected speech on social media platforms such as Facebook, Twitter and Instagram in order to identify potential extremists and predict who might engage in future acts of anti-government behavior. This obsession with social media as a form of surveillance will have some frightening consequences in coming years. As Helen A.S. Popkin, writing for NBC News, observed, “We may very well face a future where algorithms bust people en masse for referencing illegal ‘Game of Thrones’ downloads… the new software has the potential to roll, Terminator-style, targeting every social media user with a shameful confession or questionable sense of humor.”

Tracking you based on your social network: Not content to merely spy on individuals through their online activity, government agencies are now using surveillance technology to track one’s social network, the people you might connect with by phone, text message, email or through social message, in order to ferret out possible criminals. An FBI document obtained by Rolling Stone speaks to the ease with which agents are able to access address book data from Facebook’s WhatsApp and Apple’s iMessage services from the accounts of targeted individuals and individuals not under investigation who might have a targeted individual within their network. What this creates is a “guilt by association” society in which we are all as guilty as the most culpable person in our address book.

Tracking you based on your car: License plate readers are mass surveillance tools that can photograph over 1,800 license tag numbers per minute, take a picture of every passing license tag number and store the tag number and the date, time, and location of the picture in a searchable database, then share the data with law enforcement, fusion centers and private companies to track the movements of persons in their cars. With tens of thousands of these license plate readers now in operation throughout the country, affixed to overpasses, cop cars and throughout business sectors and residential neighborhoods, it allows police to track vehicles and run the plates through law enforcement databases for abducted children, stolen cars, missing people and wanted fugitives. Of course, the technology is not infallible: there have been numerous incidents in which police have mistakenly relied on license plate data to capture out suspects only to end up detaining innocent people at gunpoint.

Tracking you based on your mail: Just about every branch of the government—from the Postal Service to the Treasury Department and every agency in between—now has its own surveillance sector, authorized to spy on the American people. For instance, the U.S. Postal Service, which has been photographing the exterior of every piece of paper mail for the past 20 years, is also spying on Americans’ texts, emails and social media posts. Headed up by the Postal Service’s law enforcement division, the Internet Covert Operations Program (iCOP) is reportedly using facial recognition technology, combined with fake online identities, to ferret out potential troublemakers with “inflammatory” posts. The agency claims the online surveillance, which falls outside its conventional job scope of processing and delivering paper mail, is necessary to help postal workers avoid “potentially volatile situations.”

Now the government wants us to believe that we have nothing to fear from these mass spying programs as long as we’ve done nothing wrong.

Don’t believe it.

The government’s definition of a “bad” guy is extraordinarily broad, and it results in the warrantless surveillance of innocent, law-abiding Americans on a staggering scale.

As I make clear in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, surveillance, digital stalking and the data mining of the American people—weapons of compliance and control in the government’s hands—haven’t made America any safer. And they certainly aren’t helping to preserve our freedoms.

Indeed, America will never be safe as long as the U.S. government is allowed to shred the Constitution.

Tyler Durden
Wed, 12/04/2024 – 23:25

Renovation Downturn Forces These Home Furnishing Retailers To Increase Deals

Renovation Downturn Forces These Home Furnishing Retailers To Increase Deals

Renovation Downturn Forces These Home Furnishing Retailers To Increase Deals

Record-high home prices, combined with the average 30-year fixed mortgage rate surpassing 7% once again, continue to create the worst housing affordability environment in a generation. Consequently, the residential renovation market sours, pressuring home furnishing companies to offer better deals. 

A team of Goldman analysts led by Kate McShane updated their proprietary home furnishings promotional tracker for November, in which they found increased promotions, markdowns, and free shipping across the industry for notable home furnishings retailers including Arhaus, At Home, Bassett Furniture, Cost Plus World Market, Crate & Barrel, Ethan Allen Interiors, Havertys, Kirkland’s, Pottery Barn, PB Teen, Pottery Barn Kids, Rejuvenation, Wayfair, and West Elm.

McShane noted that average markdowns were slightly higher for the industry year-over-year last month, although Williams-Sonoma was one of the only home furnishings retailers not offering increased deals to somewhat flattish compared with the same month last year. 

Here are the key observations from their findings:

  • Free shipping ticked up sequentially and year over year in November across the industry and Williams Sonoma banners;

  • Markdowns increased sequentially and year over year across the industry;

  • Promotions are notably higher sequentially and year over year at the Williams Sonoma banner, while promotions are lower at West Elm and Rejuvenation

Industry-wide, markdowns increased month-over-month and year-over-year, with PB Kids and Wayfair offering the best deals

  • November’s industry markdowns increased both m/m and y/y: Sequentially, the average markdown across the industry increased m/m at 40% in Nov vs. 37%/37%/41% in Oct/Sep/Aug. The average markdown increased y/y compared to 39% in Nov ’23.

  • Markdown level by company: Overall, PB Kids (58%) and Wayfair (58%) were the companies with the highest average markdowns in Nov ’24. PB Teen, Rejuvenation, and West Elm had the highest markdowns on a 1-year average (also taking account of consistency in promotions over the months).

  • Free shipping: Overall days of free shipping increased both sequentially and y/y in Nov ’24 to 14 days, vs. 9/13 days in Oct’ 24/Nov ’23. Kirkland’s, Pottery Barn, and Williams-Sonoma offered free shipping every day in Nov ’24, with the next highest frequency seen at PB Kids’s at 29 days.

McShane noted, “While we don’t include RH in our promotional analysis, we do note the company continues to advertise its fall clearance sale with up to 60% off outdoor, living, dining, and bedroom items.” 

Average Markdowns on a retailer basis:

Pottery Barn 

West Elm

Williams-Sonoma

Rejuvenation

The number of days home furnishings companies offered ‘free shipping’ last month surged. 

Williams-Sonoma’s free shipping promotion was much higher than the industry average. 

The entire industry has been in the dumps since the Covid spike.

And this is why.

McShane highlighted that the barometer for the residential renovation market remains uninspiring. 

Given all this, there are indeed deals for patient consumers who held back during the Covid surge in home renovations. Goldman’s McShane gives readers a broad understanding of what home furnishings companies offer the best deals. 

Tyler Durden
Wed, 12/04/2024 – 18:00

Israeli family sues Hamas-linked UNRWA after son killed by terrorists on Oct 7

Israeli family sues Hamas-linked UNRWA after son killed by terrorists on Oct 7

The parents of Yonatan Samerano, whose body has been held by Hamas since the terrorist group’s October 7 attack on Israel, have filed a lawsuit against the United Nations Relief and Works Agency for Palestine Refugees.