The Market Ticker
Commentary on The Capital Markets

View this entry with comments (registration required to post)

Hoh hoh hoh... have a turkey with this during the coming week...

As many as 30,000 lost emails from Lois Lerner -- the ex-IRS official at the center of the agency's targeting scandal -- have been recovered by federal investigators.

The IRS has already turned over thousands of Lerner emails to congressional investigators but has said the remainder are gone forever because Lerner’s hard-drive crashed in 2011. And in June, agency Commissioner John Koskinen told Congress that back-up tapes containing the missing emails had been destroyed.  

That now turns out to have been a lie.

So aside from the content, which may or may not show anything, where are the handcuffs for what appears to be black-letter perjury?

View this entry with comments (registration required to post)

How idiotic can you be, America?

The latest technology used by Apple and Google to meet consumers’ demands on securing private data is hitting a nerve with the Department of Justice.

In a meeting last month with Apple executives, the No. 2 official at the Justice Department said the company’s new encryption technology that locks out law enforcement would lead to a tragedy, The Wall Street Journal reported. A child would die and the police would not be able to search the suspect’s phone, the official allegedly said.

Note two things:

  • The scaremongering using children, the typical way that the government shuts down anything reasoned debate.

  • Not even a pretense that the desired change would prevent the death -- it would only be the post-hoc search of the phone that would be curtailed!

In a word, so what?  If little Suzy is dead then we have a suspect and a body; the fact that there was a murder hasn't changed.  That the police have to actually do their work the old-fashioned way doesn't change anything either, nor does access to someone's phone (or lack thereof) change DNA and other physical evidence.

Apple's executives apparently took this the same way I did, which is good.  Credit where credit is due.

But pay attention folks, because there are some 330 million of us here and complying with the DOJ's demands will get a hell of lot more of us killed than just little Suzy!

Washington (CNN) -- China and "probably one or two other" countries have the capacity to shut down the nation's power grid and other critical infrastructure through a cyber attack, the head of the National Security Agency told a Congressional panel Thursday.

Admiral Michael Rogers, who also serves the dual role as head of U.S. Cyber Command, said the United States has detected malware from China and elsewhere on U.S. computers systems that affect the daily lives of every American.

These attacks are possible because of crap, hole-ridden so-called "security" and the use of off-the-shelf garbage that is riddled with back doors and just plain old-fashioned shoddy programming.

I used to write bespoke software -- ground-up, from the operating system level that ran on bare hardware, to run fairly-critical infrastructure.  It was not only air-gapped it ran out of PROMs that could not be field-programmed in the first place.

For convenience and cost reasons most modern command and control, along with many process-control systems, run not only on commodity hardware (which could be tampered with at manufacturing time) but also on commodity commercial software as well.  The latter is potentially disastrous because such machines and software are designed to be field-upgraded.

The capacity for anyone to override the user's security measures, including cryptographic integrity of the operating system and applications themselves, places that machine at the risk of compromise by malicious third parties who can be half a world away -- including nation-state third-parties.

Just a couple of days ago I detected and successfully interdicted a high-intensity attempt to break into my infrastructure here at The Ticker coming from Germany.  There are dozens of attempts daily that hail from China, Russia and parts of what were previous the USSR, but they tend to be low-intensity attacks that are in the noise level and, other than a nice report that I get every morning with a litany of failures, are unremarkable.  This one was different; it was high-intensity and sustained over the space of several hours, and was a clear probe attack aimed at penetrating SSL negotiation.

It is highly likely that the actual machines assaulting my infrastructure were not the "true source"; that is, those systems were under control of someone else -- and that "someone else" may well be in China or Russia somewhere.  They might even be part of or paid by the government.  In fact, I'd bet on it.

But there's not much here at stake if, by some chance, I screw up and someone gets in.  Oh sure, it's a hassle and maybe something gets stolen that's here, or a disk gets scrambled.  That would be annoying, but not fatal to anyone.

The same problem at a nuclear power plant or large substation could have critical or even catastrophic consequence.

As I wrote the other day for our government to demand this sort of "back door" access will get Americans -- and large numbers of them -- killed.  It might get a significant percentage of our population killed, and might result in the collapse of our economy and society -- all because of the ignorant arrogance of people in our government.

We must not permit this to happen.

View this entry with comments (registration required to post)

View this entry with comments (registration required to post)

Why does this surprise anyone?

Hours after the leaders of the world's 20 most developed economies sought to boost confidence by promising to increase global output by $2 trillion over five years, Japan said it had fallen into recession.

That leaves the country — the world's third-largest economy — on a long and growing list of troubled economies. China is slowing as well, and Europe can't seem to take off.

Among major economies, only the United States and Britain are growing at decent rates, and how long that lasts depends on how much trouble their trading partners are in.

No we're not.

You must subtract the amount of "QE" in percentage terms of the economy from the nominal growth rate.  This is basic algebra; you must remove the same term from both sides when you solve an equation; you cannot add (or remove) it from only one side.

Yet that's the fraud that exists when you state "GDP" without removing all deficit financing and monetary emission from the figures!

It is, in fact, the predicate of this series:

Growth?  What growth?

And yes, credit emission is not limited to central banks or governments -- in point of fact they're not the largest source of the problem in that they step in only when private banks can't or won't!

Everyone wants to scream "END THE FED!" but in fact if you ended the Fed you'd do nothing for two reasons:

  • The Fed is not the largest source of the problem; that is (by a huge margin) found in the private banking cartel.

  • The Fed can only buy US Government securities.  Therefore, if there is no deficit there is no Fed buying activity.

It's that simple folks when you boil it all down.  The Fed can want to engage in QE but if there are no government bonds to buy then it is unable to do so.  Without continued new emission of more and more bonds (that is, more and more deficit spending) The Fed is unable to perform "QE"; it is not mathematically possible given the boundaries they are forced to operate under.

The reason that such attempts cannot work is that the smaller is never able to upstage the greater.  That is, a minority position is never larger than the whole.  By definition it is impossible for The Fed or any other Central Bank to violate this precept; it is simple arithmetic.

So why do it?

That's easy: It's far easier to steal, and you're less likely to get shot doing it, if you steal by subterfuge than engaging in your theft through a straight-up "in your face" assault.

But it is The Federal Government and their cronies, not The Fed itself, that is doing the stealing.

View this entry with comments (registration required to post)

Main Navigation
Full-Text Search & Archives
Archive Access
Get Adobe Flash player
Legal Disclaimer

The content on this site is provided without any warranty, express or implied. All opinions expressed on this site are those of the author and may contain errors or omissions.


The author may have a position in any company or security mentioned herein. Actions you undertake as a consequence of any analysis, opinion or advertisement on this site are your sole responsibility.

Market charts, when present, used with permission of TD Ameritrade/ThinkOrSwim Inc. Neither TD Ameritrade or ThinkOrSwim have reviewed, approved or disapproved any content herein.

The Market Ticker content may be reproduced or excerpted online for non-commercial purposes provided full attribution is given and the original article source is linked to. Please contact Karl Denninger for reprint permission in other media or for commercial use.

Submissions or tips on matters of economic or political interest may be sent "over the transom" to The Editor at any time. To be considered for publication your submission must include full and correct contact information and be related to an economic or political matter of the day. All submissions become the property of The Market Ticker.