RMF Report: Breaking Up? A Route Out of the Eurozone Crisis (2011)

19 November 2011, dusan

“Debtor-led default and exit are fraught with risk, and have costs attached to them. But the alternative is economic and social decline within the EMU that could still end up in chaotic and even costlier exit. In contrast, if default and exit were planned and executed by a decisive government, they could put the country on the path to recovery. For that it would be necessary to adopt a broad economic and social programme including capital controls, redistribution, industrial policy, and thorough restructuring of the state. The aim would be to change the balance of power in favour of labour, simultaneously putting the country on the path of sustainable growth and high employment. Not least, national independence would also be protected.” (from Executive summary)

Authors: C. Lapavitsas, A. Kaltenbrunner, D. Lindo, J. Meadway, J. Michell, J.P. Painceira, E. Pires, J. Powell, A. Stenfors, N. Teles, L. Vatikiotis
Published by Research on Money and Finance, November 2011
RMF Occassional Report 3
92 pages

Media Coverage of the Report: The Miami Herald (by Joanna Kakissis, 17 November 2011), Prin (in Greek, by Petros Kosmas, 13 November 2011), El Pais (in Spanish, by Amanda Mars, 13 November 2011), Guardian (by Heather Stewart, 13 November 2011), Eleftherotypia (in Greek, by Leonidas Vatikiotis, 12 November, 2011), CNN (by Costas Lapavitsas, 10 November 2011).

publisher

PDF
View online (Issuu.com)

The Machinery of Stability Preservation (2011) [Chinese/English]

15 August 2011, dusan

“There is widespread agreement in China, from high officials to ordinary people, about the importance of maintaining social stability. There is rather less consensus, though, about how best to ensure and promote stability. Considering the costs, both fiscal and human, of continued pursuit of the policy of “stability above all else,” some have begun to question whether, perhaps, the effort might actually be counterproductive.

In a recent article (translated below) posted on the website of Caijing magazine, two reporters who have been covering China’s social stability problem offer an excellent introduction to the organizational structure behind China’s stability management effort. Their detailed portrait of this structure as it exists at both the central and local levels leads into a trenchant analysis of China’s paradoxical pursuit of stability and a look at how that structure actually undermines that effort. Their conclusion—that the only escape from this paradox is to accelerate the pace of political and judicial reform—is a clear articulation of an aspiration that is gathering momentum in China but that will still have to overcome much resistance if it is to be realized.”

by Caijing magazine reporters Xu Kai & Li Weiao, 6 June 2011
Translated by Dui Hua Human Rights Journal, 8 June 2011

View online [Chinese]
View online [English]

related:
Stability Preservation in China (English extracts from three pieces written by Leung Man Tao, a recognized media professional and public intellectual from Hong Kong, Du Guang, a veteran Central Party School scholar, and Sun Liping, a sociology professor at Tsinghua University; 2010)
Riot erupts in southwest China town: reports (Reuters; 12 Aug 2011)

McAfee: Revealed: Operation Shady RAT (2011)

3 August 2011, dusan

“What we have witnessed over the past five to six years has been nothing short of a historically unprecedented transfer of wealth — closely guarded national secrets (including from classified government networks), source code, bug databases, email archives, negotiation plans and exploration details for new oil and gas field auctions, document stores, legal contracts, SCADA configurations, design schematics and much more has “fallen off the truck” of numerous, mostly Western companies and disappeared in the ever-growing electronic archives of dogged adversaries.

What is happening to all this data — by now reaching petabytes as a whole — is still largely an open question. However, if even a fraction of it is used to build better competing products or beat a competitor at a key negotiation (due to having stolen the other team’s playbook), the loss represents a massive economic threat not just to individual companies and industries but to entire countries that face the prospect of decreased economic growth in a suddenly more competitive landscape and the loss of jobs in industries that lose out to unscrupulous competitors in another part of the world, not to mention the national security impact of the loss of sensitive intelligence or defense information.

Yet, the public (and often the industry) understanding of this significant national security threat is largely minimal due to the very limited number of voluntary disclosures by victims of intrusion activity compared to the actual number of compromises that take place. With the goal of raising the level of public awareness today we are publishing the most comprehensive analysis ever revealed of victim profiles from a five year targeted operation by one specific actor — Operation Shady RAT, as I have named it at McAfee (RAT is a common acronym in the industry which stands for Remote Access Tool). ” (author)

Revealed: Operation Shady RAT: An investigation of targeted intrusions into 70+ global companies, governments and non-profit organizations during the last 5 years
White paper
by Dmitri Alperovitch, VP Threat Research, McAfee
Published 2 August 2011
14 pages

author’s blog entry
author’s tweet
further coverage (Vanity Fair)
further coverage (Security Week)
further coverage (Reuters)
further coverage (Guardian)

PDF (updated on 2017-11-24)