"The
rich and powerful too often bend the acts of government to their
selfish purposes, many of our rich men have not been content with equal
protection and equal benefits, but have besought us to make them richer
by acts of Congress."
Andrew Jackson (1830) Cited by Charles Sellers, The Market Revolution: Jacksonian America 1815-1846. New York: Oxford University Press, 1991, p. 62
Andrew Jackson (1830) Cited by Charles Sellers, The Market Revolution: Jacksonian America 1815-1846. New York: Oxford University Press, 1991, p. 62
"Capitalism's
biggest political enemies are not the firebrand trade unionists spewing
vitriol against the system but the executives in pin-striped suits
extolling the virtues of competitive markets with every breath while
attempting to extinguish them with every action."
Raghuram Rajan and Luigi Zingales, Saving Capitalism from the Capitalists. New York: Crown Business, 2003, p. 276.
Raghuram Rajan and Luigi Zingales, Saving Capitalism from the Capitalists. New York: Crown Business, 2003, p. 276.
From Washington's Blog via ZeroHedge:
We reported last year:...MORE
The government treats copyright infringers as terrorists, and swat teams have been deployed against them. See this, this, this and this.The American government is using copyright laws to crack down on political dissent just like China and Russia.
As the executive director of the Information Society Project at Yale Law School notes:
This administration … publishes a newsletter about its efforts with language that compares copyright infringement to terrorism.
We noted last month that the “cyber-security” laws have very little to do with security.
The Verge reported last month:
***In the State of the Union address Tuesday, President Obama announced a sweeping executive order implementing new national cybersecurity measures, opening the door for intelligence agencies to share more information about suspected “cyber threats” with private companies that oversee the nation’s “critical infrastructure.” The order is voluntary, giving companies the choice of whether or not they want to receive the information, and takes effect in four months, by June 12.
“Cyber threats cover a wide range of malicious activity that can occur through cyberspace,” wrote Caitlin Hayden, spokeswoman for the White House National Security Council, in an email to The Verge. “Such threats include web site defacement, espionage, theft of intellectual property, denial of service attacks, and destructive malware.”
***
“The EO [executive order] relies on the definition of critical infrastructure found in the Homeland Security Act of 2002,” Hayden wrote....