Dollar Remains Fragile

The US dollar looks vulnerable to additional losses next week.  While we had correctly anticipated the greenback’s losses last week, we had expected it to begin recovering ahead of the weekend.   This did not materialize and, leaving aside the yen, the dollar finished the week near its lows.   Generally speaking, the technical outlook for the greenback has soured and, in fact, warn of some risk accelerated losses in the period ahead.  

 

Nor can participants count on the economic calendar to stem the dollar’s rout.  The US has an actively slate of economic reports next week as the government catches up with the delay from the shutdown, but nothing to put the tapering back into December.   

 

At the same time, while there is some expectation the ECB may do something more in a few weeks, following up on the recent repo rate cut, it is still far too early to expect the ECB to adopt what we have dubbed  as “nuclear options”, such as a negative deposit rate or quantitative easing. Since it just adjusted the price of money (theoretically), the next step will likely seek to influence the quantity, perhaps a change in collateral rules or a reduction in reserve requirements.  

 

The euro’s resilience in the face of the repo rate cut is demonstrated by its 1% rise on a trade-weighted basis, which is the key metric of its potential economic impact.  EONIA is essentially unchanged (about half of a basis point lower) since the rate cut (which is one should have expected, as EONIA trades closer to the zero deposit rate than the repo rate).  

 

The euro has recorded higher lows for six consecutive sessions  It tested the $1.35 in the second half of last week, but did not manage to close about it.  This corresponds to a retracement objective of the nearly 5.5 cent decline  beginning Oct 25. Assuming this level is convincingly breached, we see scope for the euro to rise 1% next week toward $1.3630.   A move below $1.34 would weaken the outlook, but it probably requires a close below the 100-day moving average, which held on this basis, despite some intra-day penetration recently.  It is near $1.3365 now.  

 

Sterling made new highs for the month ahead of the weekend and now seems poised to re-challenge what appeared to have been a double top made in Oct near $1.6260.  Sterling had gone through the neckline (~$1.5890) early in the week, though not on a closing basis and the quickly rebounded, thanks to a favorable employment report and more optimistic BOE.  Its resilience was reflected in the speed at which the market shrugged off the weak retail sales report (-0.7% rather than flat as the consensus expected).  

 

The dollar did rise to two month highs against the yen and finished the last week with two consecutive closes (of the North American session) above the JPY100 for the first time in four months.  Contrary to the general assertion, it cannot be simply attributed to Fed tapering ideas.   The yen’s 1.1% loss against the dollar occurred as the US premium over Japan (10-year interest rate differential) actually fell roughly 9 bp last week, slipping lower in three consecutive sessions before the weekend.  

 

The key test for the dollar is awaiting closer to the JPY100.60, the September high, which is just below the high from the second half of July set near JPY100.85.  A break of this would bring into view the early July high near JPY101.55, which is the high posted since the decline from the year’s high set in May (~JPY03.75) to the early June low (just below JPY94).    Support has been established around JPY99 and it may require a break of that to signal a high is in place.  

 

Yen weakness is more pronounced on the crosses than against the dollar.  Indeed, the yen’s weakness appears to be, at least in part, not a dollar story.  It has fallen nearly 2% on a trade-weighted basis so far this month. Sterling is trading a multi-year highs against the yen and euro is testing the year’s high.  The New Zealand dollar is testing the JPY84 level that held in both Sept and Oct.  The Canadian dollar is at two-month highs against the yen.   

 

With the third arrow of Abenomics still apparently a work in progress, any appearance of relying on currency depreciation may face criticism by the US and Europe.  Chinese official silence on the issue is noteworthy.   Perhaps, its refrains from criticizing so as not to encourage criticism of its exchange rate policy, though that doesn’t stop the PBOC from time to time of being critical of the US (market determined) exchange rate stance.  

 

Turning to the dollar-bloc, from a technical perspective the US dollar is set to fall further.  The head and shoulders topping pattern we discussed last week proved for naught.  Even though the $0.8200 neckline was violated on Nov 12, there was no follow through selling and the Kiwi rebounded smartly (almost 2%) to vie with the euro as the strongest of the major currencies on the week.  It seems that the rule here, and in sterling, is play the range until convincingly violated.   If applied to the yen, it would seem to warn against playing the break out.  

 

The Australian dollar was largely range bound for most of last week, but this is increasingly looking like a base, rather than a pause before the next leg lower.  The key may be the downtrend line drawn off the Oct 23 high near $0.9760 and Nov 6 high near $0.9545.  It comes in near $0.9400 on Monday, though falls toward $0.9325 by the end of the week.    Technically, a move above $0.9400 could spur another 1.0-1.5 cent advance.  

 

The move above CAD1.05 on Nov14 appeared to have exhausted the USD bulls.  A break now of CAD1.0430 (where a retracement objective and 20 day moving average lay) would confirm a near-term greenback high), and ideally CAD1.04, would suggest a move toward at least the lower end of the 5-month trading range (~CAD1.0250-CAD1.03).  

 

The Mexican peso’s 1.75% rise last week edged out the South African rand as the strongest of the emerging market currencies.  The US dollar’s decline brought it within a spitting distance of the uptrend line drawn off the Sept and mid- and late-Oct lows.  It comes in near MXN12.91 on Monday.  A break may signal another 1% decline in the dollar.  

 

Observations from the speculative positioning in the CME currency futures:  

 

1.  As was the case during the last reporting period, the two significant adjustments to speculative position were cut of gross long euro positions (by 17.2k contracts) and the jump in gross short yen positions (23.6k contracts).  Gross long euro positions were cut by 50k contracts over the past two week and as of Nov 12, were the lowest since mid-September (86.1k).   The gross short yen positions have increased by 37k contracts over the same period (to 116.1k).  

 

2.  The gross long Swiss franc positions have been cut by a third in the past two weeks (to 14.1k contracts).  At  43.9k contracts, the gross long sterling position was the smallest in two months.  The Australian dollar saw the largest jump in gross shorts (8.9k contracts) since May and at 56.3k contracts is the most in two months.  

 

3.  The net long euro position has been cut by 80% since late October (now stands at 16.8k contracts).  The net short yen position is the largest since May (to 95.1k contracts).  


    



via Zero Hedge http://feedproxy.google.com/~r/zerohedge/feed/~3/8OFaa0Pyn58/story01.htm Marc To Market

Baylen Linnekin on Austin’s Proposed Fast Food Restrictions

McDonaldsThe Austin,
Texas, city council will meet next Thursday to consider a
resolution that could eventually ban “fast-food food restaurants
from locating near areas that children frequent.” Specifically, the
ban, or “Healthy Food Zone ordinance,” would restrict fast food
restaurants from locating anywhere near “schools, municipal parks,
child care centers, libraries and recreation centers” in the city.
At best, writes Baylen Linnekin, it’s a protectionist measure
shielding existing businesses from competition. But it also
undermines parental control without offering any health
benefits.

View this article.

from Hit & Run http://reason.com/blog/2013/11/16/baylen-linnekin-on-austins-proposed-fast
via IFTTT

Baylen Linnekin on Austin's Proposed Fast Food Restrictions

McDonaldsThe Austin,
Texas, city council will meet next Thursday to consider a
resolution that could eventually ban “fast-food food restaurants
from locating near areas that children frequent.” Specifically, the
ban, or “Healthy Food Zone ordinance,” would restrict fast food
restaurants from locating anywhere near “schools, municipal parks,
child care centers, libraries and recreation centers” in the city.
At best, writes Baylen Linnekin, it’s a protectionist measure
shielding existing businesses from competition. But it also
undermines parental control without offering any health
benefits.

View this article.

from Hit & Run http://reason.com/blog/2013/11/16/baylen-linnekin-on-austins-proposed-fast
via IFTTT

Sandy Creek 63, Cedartown 10

It took exactly 17 seconds for the Sandy Creek Patriots to shift gears into playoff mode.

That’s how long it took Javon Jackson to return the game’s opening kickoff 82 yards for a touchdown. From there the Patriots never looked back, opening up a 42-3 lead in the second quarter en route to a 63-10 win over the Cedartown Bulldogs in the first round of the AAAA state playoffs.

Next Friday Sandy Creek will host Chestatee, who defeated Grady in its first-round game.

read more

via The Citizen http://www.thecitizen.com/articles/11-15-2013/sandy-creek-63-cedartown-10

The Internet Is Now Weaponized, And You Are The Target

By now, thanks to Edward Snowden, it is common knowledge and not just conspiracy theory, that every bit of information sent out into the wired or wireless ether is scanned, probed, intercepted and ultimately recorded by the NSA and subsequently all such information is and can be used against any US citizen without a court of law (because the president’s pet secret NISA “court” is anything but). Sadly, in a country in which courtesy of peak social networking, exhibitionism has become an art form, the vast majority of Americans not only could not care less about Snowden’s sacrificial revelations, but in fact are delighted the at least someone, somewhere cares about that photo of last night’s dinner. However, it turns out that far from being a passive listener and recorder, the NSA is quite an active participant in using the internet. The weaponized internet.

Because as Wired reports, “The internet backbone — the infrastructure of networks upon which internet traffic travels — went from being a passive infrastructure for communication to an active weapon for attacks.” And the primary benefactor: the NSA – General Keith Alexander massive secret army – which has now been unleashed against enemies foreign, but mostly domestic.

Enter the QUANTUM program….

According to revelations about the QUANTUM program, the NSA can “shoot” (their words) an exploit at any target it desires as his or her traffic passes across the backbone. It appears that the NSA and GCHQ were the first to turn the internet backbone into a weapon; absent Snowdens of their own, other countries may do the same and then say, “It wasn’t us. And even if it was, you started it.”

 

If the NSA can hack Petrobras, the Russians can justify attacking Exxon/Mobil. If GCHQ can hack Belgacom to enable covert wiretaps, France can do the same to AT&T. If the Canadians target the Brazilian Ministry of Mines and Energy, the Chinese can target the U.S. Department of the Interior. We now live in a world where, if we are lucky, our attackers may be every country our traffic passes through except our own.

 

Which means the rest of us — and especially any company or individual whose operations are economically or politically significant — are now targets. All cleartext traffic is not just information being sent from sender to receiver, but is a possible attack vector.

… which is basically packet injection:

The QUANTUM codename is deliciously apt for a technique known as “packet injection,” which spoofs or forges packets to intercept them. The NSA’s wiretaps don’t even need to be silent; they just need to send a message that arrives at the target first. It works by examining requests and injecting a forged reply that appears to come from the real recipient so the victim acts on it.

 

The technology itself is actually pretty basic. And the same techniques that work on on a Wi-Fi network can work on a backbone wiretap. I personally coded up a packet-injector from scratch in a matter of hours five years ago, and it’s long been a staple of DefCon pranks.

Traditionally, packet injections has been used mostly for censorship purposes:

The most infamous use of packet injection prior to the Snowden leaks was censorship, where both internet service providers (ISPs) and the Great Firewall of China injected TCP reset packets (RST) to block undesired traffic. When a computer receives one of these injected RST packets, it closes the connection, believing that all communication is complete.

 

Although public disclosure forced ISPs to stop this behavior, China continues to censor with injected resets. It also injects the Domain Name System (DNS) — the system all computers use to turn names such as “www.facebook.com” into IP addresses — by inserting a fake reply whenever it sees a forbidden name. (It’s a process that has caused collateral damage by censoring non-Chinese internet traffic).

And user identification, especially in making Tor obsolete. That’s right: all users of Tor believing they hide behind the veil of anonymity – you aren’t.

User cookies, those inserted by both advertising networks and services, also serve as great identifiers for NSA targeting. Yet a web browser only reveals these cookies when communicating with such sites. A solution lies in the NSA’s QUANTUMCOOKIE attack, which they’ve utilized to de-anonymize Tor users.

 

A packet injector can reveal these cookies by replying to an unnoticed web fetch (such as a small image) with a HTTP 302 redirect pointing to the target site (such as Hotmail). The browser now thinks “hey, should really go visit Hotmail and ask it for this image”. In connecting to Hotmail, it reveals all non-secure cookies to the wiretap. This both identifies the user to the wiretap, and also allows the wiretap to use these cookies.

 

So for any webmail service that doesn’t require HTTPS encryption, QUANTUMCOOKIE also allows the wiretap to log in as the target and read the target’s mail. QUANTUMCOOKIE could also tag users, as the same redirection that extracts a cookie could also set or modify a cookie, enabling the NSA to actively track users of interest as they move across the network — although there is no indication yet that the NSA utilizes this technique.

But all of the above are largely passive interception and surveillance strategies. Where it gets interesting is when the NSA’s mission is…

User Attack

 

The NSA has a collection of FOXACID servers, designed to exploit visitors. Conceptually similar to Metasploit’s WebServer browser autopwn mode, these FOXACID servers probe any visiting browser for weaknesses to exploit.

 

All it takes is a single request from a victim passing a wiretap for exploitation to occur. Once the QUANTUM wiretap identifies the victim, it simply packet injects a 302 redirect to a FOXACID server. Now the victim’s browser starts talking to the FOXACID server, which quickly takes over the victim’s computer. The NSA calls this QUANTUMINSERT.

 

The NSA and GCHQ used this technique not only to target Tor users who read Inspire (reported to be an Al-Qaeda propaganda magazine in the English language) but also to gain a foothold within the Belgium telecommunication firm Belgacom, as a prelude to wiretapping Belgium phones.

 

One particular trick involved identifying the LinkedIn or Slashdot account of an intended target. Then when the QUANTUM system observed individuals visiting LinkedIn or Slashdot, it would examine the HTML returned to identify the user before shooting an exploit at the victim. Any page that identifies the users over HTTP would work equally well, as long as the NSA is willing to write a parser to extract user information from the contents of the page.

 

Other possible QUANTUM use cases include the following. These are speculative, as we have no evidence that the NSA, GCHQ, or others are utilizing these opportunities. Yet to security experts they are obvious extensions of the logic above.

 

HTTP cache poisoning.
Web browsers often cache critical scripts, such as the ubiquitous Google Analytics script ‘ga.js’. The packet injector can see a request for one of these scripts and instead respond with a malicious version, which will now run on numerous web pages. Since such scripts rarely change, the victim will continue to use the attacker’s script until either the server changes the original script or the browser clears its cache.

 

Zero-Exploit Exploitation. The FinFly “remote monitoring” hacking tool sold to governments includes exploit-free exploitation, where it modifies software downloads and updates to contain a copy of the FinFisher Spyware. Although Gamma International’s tool operates as a full man-in-the-middle, packet injection can reproduce the effect. The injector simply waits for the victim to attempt a file download, and replies with a 302 redirect to a new server. This new server fetches the original file, modifies it, and passes it on to the victim. When the victim runs the executable, they are now exploited — without the need for any actual exploits.

 

Mobile Phone Applications. Numerous Android and iOS applications fetch data through simple HTTP. In particular, the “Vulna” Android advertisement library was an easy target,  simply waiting for a request from the library and responding with an attack that can effectively completely control the victim’s phone. Although Google removed applications using this particular library, other advertisement libraries and applications can present similar vulnerabilities.

 

DNS-Derived Man-in-the-Middle. Some attacks, such as intercepting HTTPS traffic with a forged certificate, require a full man in the middle rather than a simple eavesdropper. Since every communication starts with a DNS request, and it is only a rare DNS resolver that cryptographically validates the reply with DNSSEC, a packet injector can simply see the DNS request and inject its own reply. This represents a capability upgrade, turning a man-on-the-side into a man-in-the-middle.

 

One possible use is to intercept HTTPS connections if the attacker has a certificate that the victim will accept, by simply redirecting the victim to the attacker’s server. Now the attacker’s server can complete the HTTPS connection. Another potential use involves intercepting and modifying email. The attacker simply packet-injects replies for the MX (Mailserver) entries corresponding to the target’s email. Now the target’s email will first pass through the attacker’s email server. This server could do more than just read the target’s incoming mail, it could also modify it to contain exploits.

 

Amplifying Reach. Large countries don’t need to worry about seeing an individual victim: odds are that a victim’s traffic will pass one wiretap in a short period of time. But smaller countries that wish to utilize the QUANTUMINSERT technique need to force victims traffic past their wiretaps. It’s simply a matter of buying the traffic: Simply ensure that local companies (such as the national airline) both advertise heavily and utilize in-country servers for hosting their ads. Then when a desired target views the advertisement, use packet injection to redirect them to the exploit server; just observe which IP a potential victim arrived from before deciding whether to attack. It’s like a watering hole attack where the attacker doesn’t need to corrupt the watering hole.

Can anything be done to prevent the NSA’s internet army from running over a world that spends the bulk of its time in its reaches? Not much:

The only self defense from all of the above is universal encryption. Universal encryption is difficult and expensive, but unfortunately necessary. Encryption doesn’t just keep our traffic safe from eavesdroppers, it protects us from attack. DNSSEC validation protects DNS from tampering, while SSL armors both email and web traffic.

 

There are many engineering and logistic difficulties involved in encrypting all traffic on the internet, but its one we must overcome if we are to defend ourselves from the entities that have weaponized the backbone.

Alas, in the battle against the NSA, the biggest enemy is not the authoritarian state’s Super Big Brother, but apathy itself. It is that war that is by far the most important one, and which America has already lost.


    



via Zero Hedge http://feedproxy.google.com/~r/zerohedge/feed/~3/vaO-5hqZ-IU/story01.htm Tyler Durden

Guest Post: Understanding China’s Arctic Policies

Submitted by Arthur Guschin via The Diplomat,

Within the last seven years 11 countries (Poland (2006), Russia (2008), Finland (2009), France (2009), Sweden (2010), Iceland (2011), Spain (2011), Denmark (2012), Singapore (2012), Canada (2012) and Japan (2013) have realized the need to appoint their own Arctic ambassadors. These ambassadors are used for analysis and situational assessments in the emerging “grand Arctic game,” with the ultimate aim of exploiting mineral resources and using the Arctic route for shipping cargo from Europe to Asia. In 2008, the U.S. Geological Survey released an assessment revealing that the Arctic accounts for about 13 percent of the world’s undiscovered oil, 30 percent of its undiscovered natural gas, and 20 percent of its undiscovered natural gas liquids. In other words, 90 billion barrels of oil, 1,669 trillion cubic feet of natural gas and 44 billion barrels of natural gas.

The potential commercial benefits of cargo transportation through the Arctic in comparison to the Suez Canal also seem appealing. In August and September 2009 two German heavy-lift vessels, MV Beluga Foresight and MV Beluga Fraternity carried a cargo of steel pipes from Arkhangelsk (Russia) to Nigeria using the Northern Sea Route. The new passage shortened the distance for 3000 nautical miles and reduced fuel consumption by 200 tons per vessel, resulting in savings of 600 000 U.S. dollars. A year later, the Hong Kong vessel MV Nordic Barents transported iron ore from Kirkenes (Norway) to Shanghai using the same route and cut expenses on $180,000. In 2012, 46 vessels carried more than 1.2 million tonnes of cargo through the Northern Sea Route, up 53 percent compared with 2011. In 2010, only four vessels used the route. Some researchers predict that 30 million tones of cargo will be shipped via the Northern Sea Route to 2020

China is the largest consumer and importer of energy resources in the world but its vast geographical distance from the Arctic limits Beijing’s opportunity – at least in contrast to Arctic Council members (Canada, Denmark, Finland, Iceland, Norway, Russia, Sweden and the U.S.) – to set the agenda and form a strategy for taking advantage of new Arctic opportunities. Nevertheless, China was the first Asian state to show interest and it has begun efforts to become a full member of the Arctic Council. Beijing argues that under the United Nations Convention on the Law of the Sea the Arctic Ocean is a shipping commons, and that climate change has negative consequences for Chinese food security, particularly with the flooding of its coastal regions.

In the meantime, China has stepped up Arctic and Antarctic research. Between 1985 and 2012, Beijing initiated five Arctic and 28 Antarctic expeditions. It has also built the state-owned Arctic Yellow River Station, and entered into an agreement with Finnish company Aker Arctic Technology to construct a second ice breaker by 2014, joining the MV Xu? Lóng that Beijing bought from Ukraine in 1993. Moreover, Chinese representatives take part in the Arctic Science Committee, Arctic Science Summit Week, Ny-Ålesund Science Managers Committee, and the International Polar Year project. However, “scientific” diplomacy alone will not seem to be helping China join the most influential and important Arctic organization ( the Arctic Council) as a permanent member state.

At present, China’s Arctic initiatives suggest that Beijing is eager to camouflage its true interests in the region with environmental monitoring, Arctic life protection and concerns about indigenous peoples. Beijing's rhetoric aims at defining the Arctic as an international zone where changes must make sense for all countries and climate change is a problem for the highest levels of diplomacy. Alongside France and Germany, China sees an oil spill in the Arctic similar to that which occurred in 2010 in the Gulf of Mexico would have disastrous outcomes for global security. So it is spending around $60 million annually on polar research, is building a China-Nordic Arctic Research Center in Shanghai, and plans to increase the research staff by a factor of five, to 1000.

At the same time, Beijing is dropping hints that China is not satisfied with the current balance of power in the Arctic region. The most striking issue in the polemic that represents Beijing's ambitions in the Arctic race is the identification of China as a “near-Arctic” state. This concept has already become ingrained in the lexicon of Chinese scientists who are responsible for Arctic research.

In fact, this approach looks rather prudent and far-sighted given the U.S. and Canadian obsession with Russian deeds in the region, such as its announcement of a new Arctic strategy, the presence of Russian air and naval assets in the frontier zone, and the planting of a Russian flag at the North Pole in 2007. Beijing has left it to Moscow to convey the image of dangerous neighbor, while it maintains the pattern of a peaceful state focused on neutral topics: sponsoring expeditions, conducting climate changing surveys, supporting the development of indigenous peoples, preserving local cultures, promoting sustainable development, campaigning against environment pollution, and promoting tourism.? By developing strong positions in these areas, China will not only be able to tap the knowledge of the international scientific community and put forth arguments to support the theory of climate change influence on China; it will also be able to collaborate with six organizations (Arctic Athabaskan Council; Aleut International Association; Gwich’in Council International; Inuit Circumpolar Council; Russian Association of Indigenous Peoples of the North; Saami Council) that represent indigenous peoples and have the status of permanent members of the Arctic Council. Thus, Beijing can lobby its interests in the Council not on a direct basis, but using a special channel that has already shown itself to be effective.

This scientific approach is a path for China to achieve its true goals in the Arctic, which lie in the economic realm. To start with, Beijing seeks a diversification of supply routes. The main route for China – the Strait of Malacca – is susceptible to piracy and terrorism. An Arctic Route would let China, first, reduce transportation expenses, second, diversify and secure its shipments, and third, diminish the risk of a U.S. Navy closure of the Strait in a conflict. Former chairman Hu Jintao was well aware of China’s supply vulnerabilities. According to Chinese analysts, by 2020 between 5 to 15 percent of Chin
ese foreign trade
will be transported through the Northern Sea Route. Experts at the Norwegian transport company Tschudi Shipping Company estimate that the route from Kirkenes or Murmansk to Shanghai will reduce total sailing time by 16 days.

Meanwhile rising consumption is forcing Chinese companies to invest heavily in oil exploration and shipment, for example, from Africa and Brazil. Assumptions about Arctic natural resource deposits are thus attractive to Beijing. China National Petroleum Corporation became the third Rosneft partner (with Eni and Statoil) in the exploration of Zapadno-Prinovozemelsky (the Barents Sea), Yuzhno-Russky and Medynsko-Varandeysky structures (the Pechora Sea). It is evident that China will seek not only to get access to new oil fields but also to acquire modern drilling technology it currently lacks.

The second strategic resource for China is iron ore. Sinosteel and China Communication Corporation are already investors in the Isua project in Greeland, which will mine 15 million tonnes per year of iron ore pellets from 2015.

The third element in the Chinese economic strategy in the Arctic is a share of maritime resources, especially fish.?The U.S. National Oceanic and Atmospheric Administration has shown the region's potential in this regard. Access to fisheries is crucial for countries like Greenland and Iceland, which depend heavily on maritime resources for export earnings, and China has been very active in establishing bilateral economic contacts with these smaller members of the Arctic Council to ensure support for its permanent membership bid. These same tactics worked well in the Asia-Pacific, where China built strong investment relations with ASEAN members to help conclude a free trade agreement with ASEAN. In 2010, China provided Iceland with a $500 million-plus currency swap to support the struggling Iceland bank system. Also in 2010, Denmark signed deals with China worth $740 million in the areas of power, the green economy, agriculture and food security. In 2011, Denmark’s ambassador in China made a statement in support of a Chinese bid for permanent membership of the Arctic Council. The same position was expressed by the leaders of Greenland and Iceland. In January 2013, Swedish and even Norwegian (the spat of dissident Liu Xiaobo notwithstanding) representatives on the Arctic Council meeting in Tromsø declared a desire to start the process of discussing China's role in the Council.

In addition, China's financial aid to small countries will let Beijing participate in the Arctic infrastructure development that will be crucial for the year-round functioning of the Arctic Route. This encompasses port building, ship repair stations, transport hubs (for example, Ísafjörður in Iceland) and rescue centers.

Chinese international strategy in the Arctic will pursue solely pragmatic goals. Not only is economic prosperity as stake but also China's image as a potential global leader. While it talks up the impact of global warming on Chinese environment and food security, Beijing systematically and purposefully continues to encourage the economic dependence of small Artic states on China (such as the recent free trade agreement with Iceland) to earn support for a permanent member seat on the Arctic Council. Moreover, the high cost of projects to develop new oil infrastructure in the region force states to attract investors. This opens opportunities for China to develop influence and locks in future energy access. Next up, look for Beijing to begin negotiating route transit fees with Moscow.


    



via Zero Hedge http://feedproxy.google.com/~r/zerohedge/feed/~3/AmDjVurkz00/story01.htm Tyler Durden

Security Expert: “Buy American Doesn’t Sell Well Anymore Because It Means Give A Copy To The NSA”

We’ve previously noted that mass surveillance is killing American tech companies.

And Cisco just blamed its earnings slump on China’s disdain for NSA spying.

Security expert Bruce Schneier succinctly summed up the destruction of the American economy by the NSA’s surveillance yesterday:

Buy American doesn’t sell well anymore because it means give a copy to the NSA.

This is part of a bigger picture … the military-industrial complex (of which the NSA is a part) is killing the private sector economy. And see this.

Bonus:

World’s Most Dangerous Mission to Start In 3 Days

Removal of Fukushima Fuel Rods Hits a Bump … BEFORE It Even Starts

And if you need 2 seconds of comic relief:

Because … Dog


    



via Zero Hedge http://feedproxy.google.com/~r/zerohedge/feed/~3/wR-N97Iu50o/story01.htm George Washington

Should We End The Fed?

With the market ebullient at the prospect of more “miracles” from Yellen, we thought it worth dusting off the following brief clip discussing what it would mean to “end the Fed.” In order to answer this question, we examine countries throughout history that did not have an established central bank. So who performs the functions of a central bank in these countries? Professor White cites private institutions, including clearing house systems, banks, and financial companies, as the main actors in the monetary systems of countries without a central bank. Ultimately, he concludes that the Federal Reserve is not necessary. Evidence shows that nations can survive without a central bank. What the Federal Reserve does well can be done even better by private institutions, and the institution is capable of serious errors.

 



    



via Zero Hedge http://feedproxy.google.com/~r/zerohedge/feed/~3/tLg40fEgTrA/story01.htm Tyler Durden

6 Things To Ponder This Weekend

Submitted by Lance Roberts of STA Wealth Management,

 


    



via Zero Hedge http://feedproxy.google.com/~r/zerohedge/feed/~3/iiQ1dtpR-N0/story01.htm Tyler Durden