News and Issues
If You're Looking For A Link To the Mueller Report, Look No Further
Editor's Note:
We're not downloading the entire Mueller report, but here is the Justice Department URL to read the report at:
Report On the Investigation Into Russian Interference In The 2016 Election, Vol I and II; Special Counsel Robert S. Mueller, III
https://www.justice.gov/storage/report.pdf?_ga=2.80421777.744576135.1555603755-461170982.1555603755
Mueller received the following military awards and decorations:
Federal Reserve: Optimism in the Time of COVID; Businesses Seem Much Better Adapted to Remaining Open
Turning now to the labor market, unemployment was still at 8.4 percent in August and the labor force participation rate still down significantly from February. The extraordinary package of fiscal support in the CARES Act (Coronavirus Aid, Relief, and Economic Security Act) helped to support household incomes and to offset the effect of the huge job losses in March and April. But the act's unemployment provisions have expired, and most of the businesses that received Paycheck Protection Program (PPP) loans report that they have exhausted those funds.4 In addition, one area where increased understanding of the disease has, in many places, not led to general changes in practice is in the widespread school closures this fall. Many parents with children will be forced to work less, or not at all, which is going to be a hardship for them and weigh on the economy. So, I agree with Chair Powell that it will take continued support to sustain a robust recovery. more »
Ruth Bader Ginsburg's Partial Remarks at the University of Buffalo, August 26, 2019: "If I am notorious, it is because I had the good fortune to be alive and a lawyer in the late 1960s"
"At a reception some years ago, a college student asked if I could help her with an assignment. She had one question and hoped to compose a paper by asking diverse people to respond. What, she asked, did I think was the largest problem for the 21st century. My mind raced passed privacy concerns in the electronic age, terrorist threats, deadly weapons, fierce partisan divisions in our legislatures and polity. I thought of Thurgood Marshall’s praise of the evolution of our Constitution’s opening words, 'We, the people,' to embrace once excluded, ignored, or undervalued people — people held in human bondage, Native Americans, women, even men who owned no real property. I thought next of our nation’s motto: E Pluribus Unum, of many, one. The challenge is to make or keep our communities places where we can tolerate, even celebrate, our differences, while pulling together for the common good. 'Of many, one' is the main aspiration, I believe; it is my hope for our country and world." more »
Jo Freeman Reviews: Conquering Heroines: How Women Fought Sex Bias at Michigan and Paved the Way for Title IX
Jo Freeman Reviews: As women tackled employment discrimination, they discovered more and more inequities. The University [of Michigan] intentionally admitted more men than women, even though women had better qualifications. Among those admitted, men got more money. Women were not allowed on the marching band or into several clubs. Job ads called for "student wives." Capturing the essence of the traditional view toward women was a bas relief sculpture on the side of a major building. One side was called "The Dream of the Young Girl." It featured a woman holding a baby while a young child clutched her skirts. The other side was called "The Dream of Young Men." It featured an ocean voyage. It took 34 years to get it relocated to someplace less obvious. This [book] is an excellent case study of a nation-wide problem. more »
From the GAO: Critical Infrastructure Protection, Key Cyber-related Risks Facing the Financial Sector; Treasury Needs to Improve Tracking of Financial Sector Cybersecurity Risk Mitigation Efforts
Altogether, the sector holds about $108 trillion in assets and faces a variety of cybersecurity-related risks. Key risks include (1) an increase in access to financial data through information technology service providers and supply chain partners; (2) a growth in sophistication of malware — software meant to do harm — and (3) an increase in interconnectivity via networks, the cloud, and mobile applications. Cyberattacks that exploit risks can occur against either public or private components of the sector. For example, in February 2016, hackers were able to install malware on the Bangladesh Central Bank's system through a service provider, which then directed the Federal Reserve Bank of New York to transfer money to accounts in other Asian countries. This attack resulted in the theft of approximately $81 million. more »