Posts

Will Senators Filibuster Chuck Hagel’s Nomination to Get the Targeted Killing Memo?

Eleven Senators just sent President Obama a letter asking nicely, for at least the 12th time, the targeted killing memo. They remind him of his promise of transparency and oversight.

In your speech at the National Archives in May 2009, you stated that “Whenever we cannot release certain information to the public for valid national security reasons, I will insist that there is oversight of my actions — by Congress or by the courts.” We applaud this principled commitment to the Constitutional system of checks and balances, and hope that you will help us obtain the documents that we need to conduct the oversight that you have called for. The executive branch’s cooperation on this matter will help avoid an unnecessary confrontation that could affect the Senate’s consideration of nominees for national security positions. 

And asks — yet again — for “any and all memos.”

Specifically, we ask that you direct the Justice Department to provide Congress, specifically the Judiciary and Intelligence Committees, with any and all legal opinions that lay out the executive branch’s official understanding of the President’s authority to deliberately kill American citizens.

But perhaps the most important part of this letter is that it refers not just to John Brennan’s nomination, but to “senior national security positions.”

As the Senate considers a number of nominees for senior national security positions, we ask that you ensure that Congress is provided with the secret legal opinions outlining your authority to authorize the killing of Americans in the course of counterterrorism operations.

There are just 11 Senators on this list:

  • Ron Wyden (D-Ore.)
  • Mike Lee (R-Utah)
  • Mark Udall (D-Colo.)
  • Chuck Grassley (R-Iowa)
  • Jeff Merkley (D-Ore.)
  • Susan Collins (R-Maine)
  • Dick Durbin (Ill.)
  • Patrick Leahy (D-Vt.)
  • Tom Udall (D-N.M.)
  • Mark Begich (D-Alaska)
  • Al Franken (D- Minn.)

And just three of these — Wyden, Mark Udall, and Collins — are on the Intelligence Committee. That’s not enough to block Brennan’s confirmation.

But it may be enough to block Hagel’s confirmation, given all the other Republicans who are opposing him.

Lisa Murkowski Admits She Voted To Help Catholic Church Enforce a Doctrine She Ignores

As I noted last week, every single Catholic Senator save Susan Collins who voted for the Blunt Amendment last week appears likely to have relied on the birth control their Church prohibits to limit the size of their families. Lisa Murkowski, who has just 2 kids, was among the 10 Catholics who was using her position to help the Catholic Church enforce a doctrine she herself has ignored.

And in an interview claiming she now regrets that vote, Murkowski as much as admits that’s what she did. (h/t TPM)

What Lisa Murkowski told me I already suspected. She’s a moderate. She supports abortion rights and contraception coverage. She also doesn’t line up completely with the Catholic Church when it comes to birth control. She regretted her recent vote.

[snip]

I pointed out that her support for birth control conflicts with the Catholic mandate against it.

“You know, I don’t adhere to all of the tenets of my faith.

Now, she’s still spinning her vote (and her letter opposing Obama’s rule on contraception) as one in favor of religious freedom.

She’d meant to make a statement about religious freedom, she said, but voters read it as a vote against contraception coverage for women.

But it is not “religious freedom” to craft laws to help the Church enforce mandates that almost none of its adherents–and probably few, if any, of the Catholic Senators supporting the law–abide by. It is an improper use of government to aid a religious institution.

Not to mention, rank hypocrisy.

One Year After Collateral Murder Release, DOD’s Networks Are Still Glaring Security Problem

As I have posted several times, the response to WikiLeaks has ignored one entity that bears some responsibility for the leaks: DOD’s IT.

Back in 2008, someone introduced malware to DOD’s computer systems. In response, DOD announced it would no longer allow the use of removable media in DOD networks. Yet that is precisely how Bradley Manning is reported to have gotten the databases allegedly leaked. In other words, had DOD had very basic security measures in place they had already been warned they needed, it would have been a lot harder for anyone to access and leak these documents.

Often, when I have raised this issue, people are simply incredulous that DOD’s classified network would be accessible to removable media (and would have remained so two years after malware was introduced via such means). But it’s even worse than that.

A little-noticed Senate Homeland Security hearing last month (Steven Aftergood is one of the few people who noticed) provided more details about the status of DOD’s networks when the leaks took place and what DOD and the rest of government have done since. The short version is this: for over two months after DOD arrested Bradley Manning for allegedly leaking a bunch of material by downloading information onto a Lady Gaga CD, DOD and the State Department did nothing. In August, only after WikiLeaks published the Afghan War Logs, they started to assess what had gone wrong. And their description of what went wrong reveals not only how exposed DOD was, but how exposed it remains.

Two months to respond

Bradley Manning was arrested on or before May 29. Yet in spite of claims he is alleged to have made in chat logs about downloading three major databases, neither DOD or State started responding to the leak until after the Afghan War Logs were published on July 25, 2010.

The joint testimony of DOD’s Chief Information Officer Teresa Takai and Principal Deputy Under Secretary for Intelligence Thomas Ferguson explains,

On August 12, 2010, immediately following the first release of documents, the Secretary of Defense commissioned two internal DoD studies. The first study, led by the Under Secretary of Defense for Intelligence (USD(I)), directed a review of DoD information security policy. The second study, led by the Joint Staff, focused on procedures for handling classified information in forward deployed areas.

In other words, “immediately” (as in, more than two weeks) after the publication of material that chat logs (published two months earlier) had clearly explained that Manning had allegedly downloaded via Lady Gaga CD months earlier, DOD commissioned two studies.

As State Department Under Secretary of Management Patrick Kennedy explained, their response was no quicker.

When DoD material was leaked in July 2010, we worked with DoD to identify any alleged State Department material that was in WikiLeaks’ possession.

It wasn’t until November–at around the time when NYT was telling State precisely what they were going to publish–that State started responding in earnest. At that time–over four months after chat logs showed Manning claiming to have downloaded 250,000 State cables–State moved its Net Centric Diplomacy database from SIPRNet (that is, the classified network) to JWICS (the Top Secret network).

DOD’s exposed IT networks

Now, frankly, State deserves almost none of the blame here. Kennedy’s testimony made it clear that, while the WikiLeaks leak has led State to enhance their limits on the use of removable media access, they have systems in place to track precisely who is accessing data where.

DOD won’t have that across their system for another year, at least.

There are three big problems with DOD’s information security. First, as the Takai/Ferguson testimony summarized,

Forward deployed units maintained an over-reliance on removable electronic storage media.

It explains further that to make sure people in the field can share information with coalition partners, they have to keep a certain number of computers accessible to removable media.

The most expedient remedy for the vulnerability that led to the WikiLeaks disclosure was to prevent the ability to remove large amounts of data from the classified network. This recommendation, forwarded in both the USD(I) and Joint Staff assessments, considered the operational impact of severely limiting users’ ability to move data from SIPRNet to other networks (such as coalition networks) or to weapons platforms. The impact was determined to be acceptable if a small number of computers retained the ability to write to removable media for operational reasons and under strict controls.

As they did in 2008 after malware was introduced via thumb drive, DOD has promised to shut off access to removable media (note, Ferguson testified thumb drives, but not CDs, have been shut down for “some time”). But 12% of the computers on SIPRNet will still be accessed by removable media, though they are in the process of implementing real-time Host Based Security System tracking of authorized and unauthorized attempts to save information on removable media for those computers.

In response to a very frustrated question from Senator Collins, Ferguson explained that DOD started implementing a Host Based Security System in 2008 (the year DOD got infected with malware). But at the time of the leak, just 40% of the systems in the continental US had that system in place; it was not implemented outside of the US, though. They weren’t implemented overseas, he explained, because a lot of the systems in the field “are cobbled together.”

In any case, HBSS software will be in place by June. (Tech folks: Does this means those computers are still vulnerable to malware introduced by removable media? What about unauthorized software uploads?)

Then there’s data access control. DOD says it can’t (won’t) password protect access to information because managing passwords to control the access of 500,000 people is too onerous for an agency with a budget larger than Australia’s gross national product. Frankly, that may well be a fair approach given the importance of sharing information.

But what is astounding is that DOD is only now implementing public key infrastructure that will, first of all, make it possible to track what people access and–some time after DOD collects that data–to start fine tuning what they can access.

DoD has begun to issue a Public Key Infrastructure (PKI)-based identity credential on a hardened smart card. This is very similar to the Common Access Card (CAC) we use on our unclassified network. We will complete issuing 500,000 cards to our SIPRNet users, along with card readers and software, by the end of 2012. This will provide very strong identification of the person accessing the network and requesting data. It will both deter bad behavior and require absolute identification of who is accessing data and managing that access.

In conjunction with this, all DoD organizations will configure their SIPRNet-based systems to use the PKI credentials to strongly authenticate end-users who are accessing information in the system. This provides the link between end users and the specific data they can access – not just network access. This should, based on our experience on the unclassified networks, be straightforward.

DoD’s goal is that by 2013, following completion of credential issuance, all SIPRNet users will log into their local computers with their SIPRNet PKI/smart card credential. This will mirror what we already do on the unclassified networks with CACs.

[Takai defines what they’re doing somewhat just before 88:00]

Note what this says: DOD is only now beginning to issue the kind of user-based access keys to protect its classified network that medium-sized private companies use. And unless I’m misunderstanding this, it means DOD is only now upgrading the security on its classified system to match what already exists on its unclassified system.

Let’s hope nothing happens between now and that day in 2013 when all this is done.

And this particular problem appears to exist beyond DOD. While the two DIA witnesses mostly blew smoke rather than provide a real sense of where security is at (both blamed WikiLeaks on a “bad apple” rather than shockingly bad information security), the testimony of DNI’s Intelligence Community Intelligence Sharing Executive Corin Stone seems to suggest other parts of the IC area also still implementing the kind of authentication most medium sized corporations employ.

To enable strong network authentication and ensure that networks and systems can authoritatively identify who is accessing classified information, the IC CIO is implementing user authentication technologies and is working with the IC elements to achieve certificate issuance to eligible IC personnel in the first quarter of fiscal year 2012.

So that’s the issue of removable media and individualized access tracking.

Which leaves one more big security hole. According to Takai/Ferguson, DOD didn’t–still didn’t, as of mid-March–have the resources in place to detect anomalous behavior on its networks.

Limited capability currently exists to detect and monitor anomalous behavior on classified computer networks.

This confirms something Manning said in chat logs: no one is following the activity occurring on our networks in Iraq (or anywhere else on SIPRNet, from the sounds of things), and flagging activities that might be an intrusion.

The part of the Takai/Ferguson testimony that details very hazy plans to think about maybe implementing such a system (pages 6-7) is worth a gander just for the number of acronyms of titles of people who are considering maybe what to implement some time in the future. It’s all a bunch of bureaucratic camouflage, IMO, to avoid saying clearly, “we haven’t got it and we haven’t yet figured out how we’re going to get it.” But here are the two most concrete descriptions of what the Department of Defense plans to do to make sure no one is fiddling in their classified networks. First, once they get HBSS completely installed, then they will install an NSA audit program on top of that.

One very promising capability is the Audit Extraction Module (AEM) developed by the National Security Agency (NSA). This software leverages already existing audit capabilities and reports to the network operators on selected audit events that indicate questionable behavior. A great advantage is that it can be integrated into the HBSS we have already installed on the network, and so deployment should be relatively inexpensive and timely. AEM is being integrated into HBSS now and will be operationally piloted this summer.

But in the very next paragraph, Takai/Ferguson admit there are better solutions out there. But DOD (again, with its budget larger than the GNP of most medium sized countries) can’t implement those options.

Commercial counterintelligence and law enforcement tools – mostly used by the intelligence community – are also being examined and will be a part of the overall DoD insider threat program. These tools provide much more capability than the AEM. However, while currently in use in some agencies, they are expensive to deploy and sustain even when used in small, homogeneous networks. Widespread deployment in DoD will be a challenge.

In other words, DOD wants to be the biggest part of the intelligence community. But it and its budget bigger than Brazil’s GNP won’t implement the kind of solutions the rest of the intelligence community use.

Department. Of. Defense.

Now, let me be clear: DOD’s embarrassingly bad information security does not, in any way, excuse Bradley Manning or the other “bad apples” we don’t know about from their oath to protect this information. (Note, there was also testimony that showed DOD’s policies on information sharing were not uniformly accessible, but that’s minor compared to these big vulnerabilities.)

But in a world with even minimal accountability, we’d be talking about fixing this yesterday, not in 2013 (five years, after all, after the malware intrusion). We’d have fired the people who let this vulnerability remain after the malware intrusion. We’d aspire to the best kind of security, rather than declaring helplessness because our very expensive DOD systems were kluged together. And we’d be grateful, to a degree, that this was exposed with as little reported damage as it has caused.

If this information is really classified for good reason, as all the hand-wringers claim, then we ought to be using at least the kind of information security implemented by the private sector a decade ago. But we’re not. And we don’t plan on doing so anytime in the near future.

Obama Killed The Johnsen Nomination, Not Ben Nelson Nor The GOP

It strikes me as necessary to follow up a bit on the death of the Dawn Johnsen nomination to lead the Office of Legal Counsel at the Department of Justice. Specifically, it needs to be clear the conventional wisdom of the main media, and even a surprising number of normally more clear headed progressive bloggers, that the nomination failed because of opposition from Republican obstruction coupled with opposition by Ben Nelson, is completely and patently false.

The false meme was already in play with the first substantive reporting by Sam Stein at Huffington Post as I noted yesterday. It is being propagated by the Washington Post (Republicans and “moderate lawmakers”), the New York Times (conservatives and two Democrats), even progressive stalwarts like Glenn Greenwald and McJoan at DKos have discussed the effects of the Republicans and Ben Nelson on the torpedoed nomination (although, to be fair, neither ascribes full blame on the GOP and Nelson).

Perhaps the best example of purveying the false wisdom comes from Jake Tapper at ABC. Tapper, in an article supposedly about the Obama White House not having the stomach for a fight on Johnsen, nevertheless proceeds to regurgitate the usual suspects:

Senate Republicans opposed her nomination overwhelmingly, meaning Senate Majority Leader Harry Reid, D-Nev., needed 60 votes to bring her nomination to the floor of the Senate for a vote.

The White House put all the blame on the Republican minority — White House spokesman Ben LaBolt said, “Senate Republicans will not allow her to be confirmed” — but it was a bit more complicated than that.

A Senate Democratic leadership source said that throughout 2009 two Democrats said they would vote against her — Sen. Ben Nelson, D-Neb., and Sen. Arlen Specter, D-Pa. The only Republican of the 40-member GOP caucus who said he would vote for her was her fellow Hoosier, Sen. Dick Lugar, R-Ind.
…..
Specter remained opposed to Johnsen’s nomination even after he switched parties in April 2009, but his primary opponent Rep. Joe Sestak, D-Pa., began to attack Specter for his opposition to her nomination.

Johnsen’s nomination expired at the end of 2009, but in January 2010 Specter said he’d vote for her.

This is a bunch of bunk. I have previously written extensively on why there were at least 60 votes for Johnson’s confirmation for the entire second half of last year after Al Franken was sworn in, and why there still were 60 votes for her confirmation this year upon Obama’s renomination, even after the Scott Brown victory in Massachusetts. If you have any question, please click through and refer to those articles; for now though, I want to revisit the false light being painted on Ben Nelson and Arlen Specter on the nomination’s failure. Read more

Happy Stimulus Day to Susan Collins, Who Killed Billions in School Funding

ThinkProgress has an absolutely devastating report on 111 Republican members of Congress who have attacked last year’s stimulus bill, but who have since taken credit for it. Click through for details on Republican hypocrisy close to you, but for a taste, here are the MI GOP stimulus hypocrites.

Rep. Fred Upton (R-MI) Signed A Letter Hailing Stimulus Funds As An ‘Important First Steps For Individuals And Their Families.’ The letter, signed by other members of the Michigan congressional delegation, was sent to the Director of Recovery Auto Workers and Communities. [Letter from Michigan Delegation to Ed Montgomery, 5/6/09]

-Rep. Upton Voted Against The Recovery Package Twice [Roll Call Vote #46; Roll Call Vote #70]

Rep. Vern Ehlers (R-MI) Signed A Letter Hailing Stimulus Funds As An ‘Important First Steps For Individuals And Their Families.’ The letter, signed by other members of the Michigan congressional delegation, was sent to the Director of Recovery Auto Workers and Communities. [Letter from Michigan Delegation to Ed Montgomery, 5/6/09]

-Rep. Ehlers Voted Against The Recovery Package Twice [Roll Call Vote #46; Roll Call Vote #70]

Rep. Dave Camp (R-MI) Signed A Letter Hailing Stimulus Funds As An ‘Important First Steps For Individuals And Their Families.’ The letter, signed by other members of the Michigan congressional delegation, was sent to the Director of Recovery Auto Workers and Communities. [Letter from Michigan Delegation to Ed Montgomery, 5/6/09]

-Rep. Camp Voted Against The Recovery Package Twice [Roll Call Vote #46; Roll Call Vote #70]

Rep. Thad McCotter (R-MI) Signed A Letter Hailing Stimulus Funds As An ‘Important First Steps For Individuals And Their Families.’ The letter, signed by other members of the Michigan congressional delegation, was sent to the Director of Recovery Auto Workers and Communities. [Letter from Michigan Delegation to Ed Montgomery, 5/6/09]

-Rep. McCotter Voted Against The Recovery Package Twice [Roll Call Vote #46; Roll Call Vote #70]

Rep. Candice Miller (R-MI) Signed A Letter Hailing Stimulus Funds As An ‘Important First Steps For Individuals And Their Families.’ The letter, signed by other members of the Michigan congressional delegation, was sent to the Director of Recovery Auto Workers and Communities. [Letter from Michigan Delegation to Ed Montgomery, 5/6/09]

-Rep. Miller Voted Against The Recovery Package Twice [Roll Call Vote #46; Roll Call Vote #70]

Rep. Mike Rogers (R-MI) Signed A Letter Hailing Stimulus Funds As An ‘Important First Steps For Individuals And Their Families.’ The letter, signed by other members of the Michigan congressional delegation, was sent to the Director of Recovery Auto Workers and Communities. [Letter from Michigan Delegation to Ed Montgomery, 5/6/09]

-Rep. Rogers Voted Against The Recovery Package Twice [Roll Call Vote #46; Roll Call Vote #70]

But I think another Republican–along with her “moderate” buddies, Joe Lieberman, Ben Nelson, Arlen Specter, and Claire McCaskill–who deserve some scorn today. Among the $100 billion they demanded be stripped from the stimulus package before they’d support it was money for school modernization and state fiscal stabilization funds.

We now know that–as predicted–states are reeling with budgetary problems to an extent that may cause 900,000 further job losses.

States are looking at a total budget gap of $180 billion for fiscal 2011, which for most of them begins July 1. These cuts could lead to a loss of 900,000 jobs, according to Mark Zandi, chief economist of Moody’s Economy.com.

Granted, the money that Collins took out of education stimulus last year would not have made up the difference in the cuts we’ll see from states in the upcoming fiscal year. But Collins and her buddies do deserve a reminder that their so-called fiscal moderation last year has lasting effects on the Americans losing their jobs.

Republicans Trashing Law Enforcement because It Polls Well

The best explanation for why, after having been briefed that underwear bomber Umar Farouk Abdulmutallab was in FBI custody (and therefore, anyone who watches TV would know, mirandized), Republicans more recently started attacking the Obama Administration for having mirandized Abdulmutallab is this:

Republicans discovered the renewed power of terrorism in last month’s special Senate election in Massachusetts. Neil Newhouse, the pollster for the Republican victor, Scott Brown, said voters responded to the way Mr. Brown framed the issue, supporting him 63 percent to 26 percent when told he favored charging suspected terrorists as enemy combatants in a military tribunal while his Democratic opponent would give them constitutional rights and a civilian trial.

“This moved voters more than the health care issue did,” Mr. Newhouse said. “The terrorism stuff resonated, and it wasn’t just from the advertising we did.”

In fact, Mitch McConnell all but admitted that he was hitting the Administration on civilian court issues because of Scott Brown’s election in response to a question he was asked on February 3.

“If this approach of putting these people in U.S. courts doesn’t sell in Massachusetts, I don’t know where it sells,” he told a questioner.

He added: “You can campaign on these issues anywhere in America.”

That is, Republicans are attacking law enforcement–even as they have succeeded in getting Abdulmutallab’s cooperation quicker than it took the torturers to get false information out of KSM–because it polls well, because Scott Brown won on a pro-waterboarding platform.

Here’s the timeline:

December 25, 2009: Abdulmutallab attempts to bomb plane; after refusing to talk, FBI reads Miranda warning; John Brennan briefs Republican leadership that Abdulmutallab in FBI custody; FBI tells intelligence partners it will charge Abdulmutallab criminally, to no objections

December 26, 2009: FBI again tells intelligence partners it will charge Abdulmutallab criminally, to no objections

January 1, 2010: Two FBI agents fly to Nigeria to seek help from Abdulmutallab’s family

January 4, 2010: Scott Brown embraces water-boarding, advocates trying Abdulmutallab in military commission

January 5, 2010: Administration considers, but rejects, possibility of treating Abdulmutallab as enemy combatant

January 7, 2010: Obama Administration releases report of what went wrong on terror attack

January 8-10. 2010: 57% surveyed prefer military commission to civilian trial

January 17, 2010: Two Abdulmutallab family members fly back to Detroit to convince him to cooperate

January 19, 2010: Scott Brown wins special election

January 20, 2010: Joe Lieberman and Susan Collins hold hearing on Christmas bombing; Collins complains about information sharing, not Miranda warning; Blair says not consulted before Miranda read, says new interrogation team should have made decision though it is not yet functional

Several days after his family arrives: Abdulmutallab begins to cooperate

January 25, 2010: Lieberman and Collins write letter attacking FBI for giving Miranda warning

January 27, 2010: Mitch McConnell and others write Holder complaining about Miranda warning

January 30, 2010: Susan Collins attacks Obama for Miranda warning in weekly radio address

February 2, 2010: Mueller tells SSCI Abdulmutallab is cooperating

February 3, 2010: Holder responds to Republican critics; Mitch McConnell attacks “law enforcement” approach and later admits it works in campaigns, mentioning Brown’s victory

February 7, 2010: John Brennan reveals that Republican leaders briefed on FBI custody for Abdulmutallab, made no objections

February 9, 2010: John Brennan writes op-ed, “We need no lectures.”

Susan Collins: I Stand With Crazy Pete the Twit-Leaker in Opposing Intelligence Whistleblowers

I’ve been covering the misplaced priorities of Crazy Pete Hoekstra–who doesn’t want federal Intelligence Community employees to have a way of alerting Congress to fraud and wrong-doing without exposing classified information and/or losing their jobs, but who is happy to Twitter sensitive information about his and Minority Leader Boehner’s travels in Baghdad.

It seems that Susan Collins has the same misplaced priorities. She single-handedly axed the House-backed provision to include whistleblower protection in the stimulus package–and with it, prevented a key means of making sure taxpayer funds were spent wisely.

But, according to a person following the bill closely, Collins used today’s conference committee to drastically water down the measure, citing national security concerns as the reason for her opposition. In the end, the protections were so weakened that House negotiators balked, and the result was that the entire amendment was removed.

According to the person following the bill, Collins was the "central roadblock" to passing the protections.

To make matter worse, Collins is the ranking Republican on the Senate Homeland Security and Government Affairs commitee, which, as an oversight committee, might be expected to see its role as protecting whistleblowers. She also sits on the Senate appropriations committee, giving her a strong position from which to wield influence during today’s negotiations.

Though Senate leader Harry Reid supported the protections, said the source, he wasn’t willing to strong-arm Collins on the issue, given her central role in negotiations over the stimulus bill as a whole. [my emphasis]

I guess that about sums up the state of Republican approaches to both Homeland Security and Appropriations that they would work hard to deprive taxpayers of the protection from fraud and wrong-doing they need.  

Senate Stimulus: Steal from the Poor to Give to the Affluent

ProPublica has done a comparison of the House and Senate stimulus packages. It shows, in striking fashion, how much the Grassley-Isakson-Coburn-Collins-Bad Nelson bill skews spending away from the poor–the most stimulative kind of spending, since these people need this money badly and would spend it right away–to the upper middle class:

Aid to Low-Income Families Total $124,186,000,000 $97,230,900,000 ▼$26,955,100,000
Health insurance aid   $2,272,000,000 ▲$2,272,000,000
Unemployment benefits $36,000,000,000 $39,490,000,000 ▲$3,490,000,000
COBRA healthcare for unemployed $30,300,000,000 $20,000,000,000 ▼$10,300,000,000
Hunger programs $21,176,000,000 $17,100,000,000 ▼$4,076,000,000
Housing $13,510,000,000 $8,600,000,000 ▼$4,910,000,000
Medicaid for unemployed $8,600,000,000   ▼$8,600,000,000
Job training and placement $5,120,000,000 $4,300,000,000 ▼$820,000,000
Disabled and elderly programs $4,200,000,000   ▼$4,200,000,000
Other $5,280,000,000 $5,468,900,000 ▲$188,900,000

 The Senate bill took out $27 billion in spending for the poor, ending with a total of $97 billion.

Tax Cuts Total $282,284,000,000 $358,162,000,000 ▲$75,878,000,000
Manufacturing   $1,603,000,000 ▲$1,603,000,000
Individuals $184,637,000,000 $302,198,000,000 $117,561,000,000
State and local governments $42,957,000,000 $14,272,000,000 ▼$28,685,000,000
Businesses $29,483,000,000 $17,546,000,000 ▼$11,937,000,000
Energy projects $19,961,000,000 $17,682,000,000 ▼$2,279,000,000
Other $5,246,000,000 $4,861,000,000 ▼$385,000,000

The Senate bill put in $117 billion in new tax cuts for individuals–more money than the entire $97 billion they give for those items ProPublica classifies as "Aid to Low-Income Families."

Those tax cuts consist primarily of two things: the AMT patch ($64 billion), which affects primarily upper middle class people in areas with high home prices, and the house flipping subsidy (up to $48 billion), the full credit of which is only available if inidviduals pay at least $7,.500 in taxes a year (there’s also $10-11 billion for auto sales incentives).

There are other reasons to oppose including these two tax cuts in the stimulus. The AMT patch, which isn’t really stimulative in the first place, would get passed and properly off-set in the budget appropriations process anyway. And the house flipping subsidy does little else than put money in realtor’s pockets. 

But the biggest reason is this: we’re taking food, housing, and medical care away from those who desperately need it, to put more money in the pockets of the upper middle class.

The Senate "Moderates’" reverse Robin Hood: Steal from the poor and give to the affluent!

The Grassley-Isakson-Coburn-Collins-Bad Nelson Bill

I explained yesterday how the people who crafted the crappy Senate compromise bill were, to a significant degree, Republicans. Republicans who won’t even vote for the bill.

But I forgot to credit the guy who really put the stupid in this bill: Johnny Isakson. Isakson is the former realtor who threw a huge sop to his realtor buddies into the bill, one that does little to actually stimulate the economy (aside from realtors, who after all got us into this mess), and which costs more than promised. The amendment, a $15,000 credit for those buying new or existing homes, will basically encourage more people to move houses–but will not necessarily incent new home building (because it applies to existing homes) nor will it encourage new buyers who would otherwise not have bought (because it’s for all buyers, not just first-time buyers).

Here’s Calculated Risk on how stupid this amendment is:

The sponsors and supporters of this tax credit believe this will support house prices – a mistake because this will mostly just shuffle homeowners between homes, and not reduce the excess supply.

If the incentive was for new homes only, the credit would probably help create some construction jobs. However, the job creation would be limited because of the competing oversupply of existing homes.

The tax credit for existing homes does almost nothing to help the economy. Some might argue that this is more work for agents and home inspectors, and might help with furniture sales, but the impact will be minor. Remember existing home sales are already at a normal level compared to the stock of owner occupied units, so agents are doing fine already (just not compared to the bubble years).

[snip]

The key problem for housing is prices are too high. How does this tax credit help reduce prices? Why are we trying to artificially increase the turnover rate? And why are we targeting a tax credit at higher income individuals?

Dean Baker, more succinctly, simply calls it the House Flipping Subsidy. And oh, by the way, it costs $30 billion more than Isakson originally claimed it would cost. The amendment is still in the "compromise bill" (the cowardly Senate voted it through on a voice vote), and Isakson is not about to vote for the final bill.

So to recap, here’s how this crappy bill came about.

Read more

“Bipartisan”

I avoided today’s debate on the simulus package (I shouldn’t have, because real Dems actually spoke, unlike last night, but I had to make an apple pie for mr. ew). But both in last night’s "debate" and the media today, it’s clear Republicans are pushing one meme above all others.

In spite of the fact that this bill was heavily crafted by Susan Collins, has the support of Arlen "Scottish Haggis" Specter, and probably Olympia Snowe, Republicans claim, it’s not a bipartisan bill. Whereas having Sanctimonious Joe vote with Republicans two years ago qualified as a bipartisan bill, this one doesn’t because, they say, they were locked out of the room where this was crafted. (In reality, a bunch of "moderates" left on their own accord, but truth is not a Republican strong point.)

But that’s not the most offensive part of their claim that this is not a bipartisan bill. AFAIK, Tom Coburn’s amendment remains a part of this bill, which basically prohibits these funds from going to support things like museums and parks.

Tom Fricking Coburn, one of the most conservative members of the Senate, has contributed to this bill. But that doesn’t qualify it as a bipartisan bill, for these fuckers.

And that’s not all. As Lithium Cola points out, using the work of Haley Edwards, the reason the Senate had to cut education and funds for states and Head Start is because Chuck Grassley insisted on putting the annual patch for the Alternative Minimum Tax in this stimulus package.

Haley Edwards at the Columbia Journalism Review points out a big part of why the Senate version of stimulus bill was more expensive than the House version and so "needed" to be cut back by scrapping projects to build schools and so on. The House version didn’t include the standard annual modification of the Alternative Minimum Tax, and the Senate version does.

But why, you might ask, is the Senate package so much more expensive than the House bill?

It’s got much to do with a single $64 billion tax cut benefitting the wealthiest 20 percent of Americans—a fact that was largely buried in reporting about the squabbling over which spending programs to cut.

Haley adds, "that’s one of the reasons why the House’s stimulus measure seemed to be $80 billion dollars cheaper than the Senate’s. It was really only about $30 billion cheaper—after you subtract the $64 billion revenue loss that happens every year when lawmakers curtail the scope of the AMT."

This raises an interesting question. Read more