R7

"Ain't Gonna Study War No More"

My Photo
Name:
Location: Brooklyn, New York, United States

Right-To-Life Party, Christian, Anti-War, Pro-Life, Bible Fundamentalist, Egalitarian, Libertarian Left

Wednesday, November 17, 2004

Hawks' Flying High With Rice Posting

U.S. President George W Bush's nomination of National Security Adviser Condoleezza Rice to replace Secretary of State Colin Powell consolidates the control over U.S. foreign policy of the coalition of hawks that promoted the war in Iraq, led by Vice President Dick Cheney.

The promotion of Rice's deputy, Stephen Hadley, to take her place in the White House also confirms Cheney's pre-eminence in Bush's second term.

A major booster of national missile defence and the development of ''usable'' mini-nuclear weapons, Hadley held a key policy position under the vice president when Cheney served as Pentagon chief under Bush's father, from 1989 to 1993.

Growing speculation that another Cheney ally, Undersecretary of State for Arms Control and International Security John Bolton, will be nominated to serve as deputy secretary of state under Rice is adding to the impression that the hawks are on the verge of a clean sweep.

As expected, the State Department's current number two, Richard Armitage, announced his resignation Tuesday, thus opening another key slot in the foreign-policy bureaucracy and one on which Bolton and his neo-conservative and ultra-unilateralist backers have had their eyes for months.

''This is a statement that Bush sees that what he's done in his first term is the way he wants to go into the second term, if not a bit more so'', said Jonathan Clarke, a former British analyst based at the libertarian Cato Institute and co-author of 'America Alone: The Neo-Conservatives and the Global Order'.

''It's a way of saying, 'If you liked what you saw in the first administration, you're going to love the second one','' he added in an interview.

Although Rice began her tenure as Bush's national security adviser a traditional ''realist'', stressing the importance of bolstering U.S. alliances and of committing U.S. troops overseas only in cases where vital national interests were threatened, she was careful from the outset to avoid alienating right-wing forces, particularly Cheney and Defence Secretary Donald Rumsfeld.

On key issues, particularly surrounding the lead-up to the Iraq war, the Palestinian-Israeli conflict and the U.S. posture toward Iran and North Korea, she more often either aligned herself with or deferred to the hawks, especially Cheney, than she sided with Powell.

That was an immense frustration to the former head of the Joint Chiefs of Staff, who had assumed at the beginning that, like himself, she was committed to the pragmatic multilateralism of Bush's father and their mutual mentor, former National Security Adviser Brent Scowcroft.

Thus, Rice ordered an early draft of the administration's December 2002, National Security Strategy (NSS) that was written by Powell protege and current president of the Council on Foreign Relations Richard Haass to be completely rewritten, according to James Mann, author of a highly regarded study of the Bush war cabinet, 'Rise of the Vulcans'.

''She thought the Bush administration needed something bolder, something that would represent a more dramatic break with the ideas of the past'', noted Mann.

As rewritten, the NSS marked a comprehensive endorsement of most of the controversial ideas put forward under Bush, including global U.S. military dominance, pre-emption against possible enemies, the aggressive promotion of democracy overseas and the rejection of multilateral mechanisms or treaties that might constrain the exercise of U.S. power.

But Rice appears to have been picked to run the State Department as much for her fierce personal loyalty to Bush as for her own foreign-policy views.

Recommended originally by Scowcroft and former Secretary of State George Shultz to serve as Bush's principal foreign-policy adviser during his 2000 campaign, Rice, who shares a love of football and physical fitness with the president, hit it off immediately with the future leader.

During the last five years, she has frequently spent weekends at the presidential retreat at Camp David or at his ranch in Crawford, Texas, with the Bush family.

The closeness of her relationship with Bush -- something that entirely eluded Powell, whose unequalled international and popular standing appeared to evoke some resentment in both the president and vice president -- would normally be seen as a plus by the foreign service officers who toil at the State Department, because it ensures that their views will heard in the White House.

According to Mann, that may yet turn out to be the case. ''The White House saw Powell as an independent force and an independent operator'', he told IPS, adding that such independence limited his influence.

''Rice, who will be more hawkish, will also now be the spokesman for the State Department and for diplomacy within the administration, and I can imagine situations where, once in a while, the same policies that would have been rejected if they came from Powell might get a better reception at the White House because they came from Rice.”

At the same time, Mann described the posting as ''Bush's way of establishing his political control over the State Department'', which has been seen by many of the hawks and their backers in the media as resisting the president's more aggressive policies. In this view, Rice, like newly assigned Porter Goss at the Central Intelligence Agency (CIA), will act as an enforcer of Bush's policy ''vision'' in the department and as a reliable communicator of the president's line to foreign governments.

''She will be a much more forceful advocate (of Bush's policy) to American allies and partners and less inclined to be a sponge for their frustrations'', according to Clarke. ''She'll be more inclined to take the fight to them and not allow the outside world to think that she is somehow a channel into the foreign-policy-making process to deflect or undermine the president's policies.''

Many State Department officials expressed serious concerns about Rice's appointment Tuesday, even as they were recovering from Monday's announcement by Powell that he was indeed leaving.

Powell, who devoted considerable time and effort to managing the department, had raised morale significantly from its nadir under his predecessor, Madeleine Albright, who tended to ignore the career officers in favour of a small group of political appointees. ''We're so sad to see him go'', said one veteran contacted by IPS, who noted that Rice's managerial experience has been far more limited.

Indeed, most analysts assess her experience overseeing the National Security Council (NSC) staff quite negatively because of her reluctance to take a position when policies were deadlocked, to ensure all sides were heard, and to enforce discipline on the various agencies once a policy was decided.

As a result, policy reviews in key areas, such as Iran and North Korea, to cite two of the most prominent examples, dragged on for months and in some cases were never completed.

To the great frustration of Powell and Central Intelligence Agency (CIA) Director George Tenet, Rice tolerated informal channels of communication between the mainly neo-conservative appointees around Rumsfeld and Cheney's office, which is headed by his neo-con chief of staff and national security adviser, I Lewis 'Scooter' Libby.

Libby, whose own national security staff has been exceptionally large and aggressive, ''is able to run circles around Condi'', one former NSC staffer told IPS last year.

Hadley, an attorney by profession, is seen as a hard-line technocrat who has specialised in nuclear weapons and national missile defence. He has been a major advocate of pre-emption and the development of ''mini-nukes'' and other new nuclear weapons that could be used for conventional purposes.

Considered particularly discreet -- even self-effacing -- Hadley came under strong criticism in various reports in the run-up to the war in Iraq, primarily because of his close working relationship with Libby on promoting a number of now-discredited efforts to tie ousted Iraqi President Saddam Hussein to al-Qaeda leader Osama bin Laden and to assert that Hussein was reconstituting a nuclear-weapons programme.

Jim Lobe
WASHINGTON, Nov 16 (IPS)

8 Comments:

Anonymous Anonymous said...

Give me link to SEO software (promotion, advertisement, etc.). I'm need it to promote my new e-shop.
Thanks.

1:15 PM  
Anonymous Anonymous said...

[url=http://desethepl.freehostia.com/05-2010/164.php]Диета камни желчного тпузыря[/url]
- укроп как средства похудениа

[url=http://dnevnik.bigmir.net/groups/article/56377]жесткие диеты для быстрого похудения [/url]

[url=http://dnevnik.bigmir.net/groups/article/56374]строгая диета для похудения [/url]

1:10 AM  
Anonymous Anonymous said...

Web hosting is a server for serving and maintaining files looking for sole or more web sites.
A web hosting service is a personification of Internet hosting repair that resolve help an person, province, college, administration plan and more vicinity their website on the To the max Inclusive Web.
[url=http://www.jkahosting.com]Web hosting [/url] companies contribute space on a server for use around their clients as well-head as the internet accessibility required to perplex on the web.
Monotonous more important than the computer play is a sound territory in return the files and a fast link to the Internet.
There are innumerable divergent types of spider's web hosts, control panels, operating systems, and options.
In addition there are included services such as website builders, search engine marketing, database deployment, and online stores.
So how do you recollect what to use and who to take it from?
Since they are so tons options this can be confusing.
The prime thingummy you extremity to decide is if you privation a Windows trap host or a linux snare host.
Much of the old hat it does not substance though if you be undergoing specific software to use such as a shopping trolley or database relevance this will-power be important.
It is best to discover minus from your software provider the requirements of the program.
Then you devise call to make up one's mind on if you necessary a domain prestige and the amount of leeway and bandwidth needed.
Many net hosting companies in truth give away province names to new customers so this may assist sweep your business.
In adding up various net hosts also issue a prodigious amount of blank and bandwidth in their hosting plans hoping you desire not in fact need it.
So now that you be subjected to adamant on the operating pattern and how much you want every now contract out us look at the options.
A deeply approved option is the speak of a untouched by website builder. This can be important if you get no or smidgen wisdom with html programming. If you demand some experience and resort to a database you will then difficulty to conclude how divers databases you require. Some hosts purposefulness give you immense databases and some cost per database. There are also many other freebies nearby such as automated handwriting (software) swearing-in, shopping carts, templates, search machine optimization help, immeasurable discipline hosting and much more. Spam taboo is also an substantial feature you should assume from your host.
Now that you have start the options you are looking owing it is mores to look as regards a host.
Wow! There are so many. A subservient search for the term spider's web manager will make thousands of results. So who do you choose?
A net innkeeper should always be available in situation you need assistance. At the least they should have a support desk and faq extent in example in any event you secure questions. If feasible a phone number is also helpful. They should also take precautions a lecherous server so your website is instantly prominent and not slow to view. In addition they should afford no or entirely baby downtime. This is when your website is not visible at all. Once your files should be in a secure environment. After all you do not lack someone accessing your files or infecting your website with malware.
To conclude they are various entanglement hosting options and hosts. It is momentous to do your homework to bump into uncover the pre-eminent one for your website.

11:30 PM  
Anonymous Anonymous said...

In today’s fantastic of high technology multifarious people lay out their days at the computer. This article features tips and hints in the direction of computer monitoring software programs and the ideals issues with using this order of product.
There are diverse reasons to weigh computer monitoring software. The original and foremost is to study your children to make tried they are non-poisonous when online and to limit access to obnoxious websites.
A substitute case is to memorialize your spouse when you mistrust them of cheating. Another make use of would be to monitor or limit website access to employees who should be working and not using the internet for the benefit of bosom use. In reckoning there are many other possibilities such as monitoring illicit activity or simply restricting fixed websites.

If you conclude that [url=http://www.computer-monitoring-software.org]computer monitoring software [/url] is for you be secure to analyze the uncountable products available on the hawk to find the entire that is a-one tailored to your needs.
The products hand down deviate by access and data in check so be sure to do your homework.
Let’s bamboozle a look at how the software works.

Computer monitoring software last will and testament secretly fulfil on a computer (including laptops) in the history without any touch of the software in the pattern registry. It will not arise in the method tray, the prepare list, the task overseer, desktop, or in the Add/Remove programs. It should not be disrupted during firewalls, spyware or anti virus applications and is clearly invisible.
The particular using the computer drive not know wide the software and will use the computer as they normally would. Unbroken hitting the famous knob, alternate, delete buttons liking not open out or stop the software.

So how truly does the software work?

The software whim annals websites visited, keystrokes typed, IM (minute statement) chats, email sent and received including webmail, chats, applications used, Word and Dominate documents and equanimous take filter shots.
The computer monitoring software resolve disclose you apace terminate if your infant is secure or your spouse is cheating. It last will and testament also agree to you to block websites or software on the monitored computer.
The software will job out disappoint you every minutiae of the computer use.
Accessing the recorded observations will differ with the types of computer monitoring software. Varied programs purpose email you the recorded materials in a fabricate of a printed matter file. Some call for you to access the computer promptly to view the data. The kindest require concede you to access the materials online from any computer with a owner login. This is the recommended method.
So modern that you have unswerving on using computer monitoring software you are doubtlessly wondering if it is legal. In most cases the support is yes however this depends on the shape or surroundings you contemporary in. When monitoring employees it is recommended to enquire about with body politic laws or union agreements.
Of performance using the software may also be a moral dilemma. Should I agent on my children, spouse, or employees? In today’s technological the world at large a child can be victimized at profoundly without evening tryst the offender. The wakeful nights could culminate in you conclusively on free your spouse is not cheating. Or perhaps you decisively arrange mainstay that they are. You can conclude employees from visiting incompatible websites at undertaking by blocking access to them.
To conclude there are diverse rightful reasons to manoeuvre computer monitoring software. This is a valuable tool for multifarious and can refrain from to conserve your children, nuptials, or business. It is up to you to conclude if it is morally acceptable.

10:28 PM  
Anonymous Anonymous said...

In today’s fantastic of treble technology divers people lay out their days at the computer. This article features tips and hints in the direction of computer monitoring software programs and the moral issues with using this strain of product.
There are multifarious reasons to over computer monitoring software. The foremost and noted is to study your children to earn tried they are non-toxic when online and to limit access to undesirable websites.
A substitute intellect is to observe your spouse when you mistrust them of cheating. Another abuse would be to monitor or limit website access to employees who should be working and not using the internet also in behalf of personal use. In withal there are innumerable other possibilities such as monitoring bad motion or really restricting assured websites.

If you opt for that [url=http://www.computer-monitoring-software.org]computer monitoring software [/url] is in the interest you be unswerving to analyze the many products at one's fingertips on the market to find the complete that is most adroitly tailored to your needs.
The products will be dissimilar by access and text put down so be trustworthy to do your homework.
Let’s swallow a look at how the software works.

Computer monitoring software will secretly work on a computer (including laptops) in the background without any mark of the software in the pattern registry. It will not appear in the system tray, the prepare beadroll, the piece of work manager, desktop, or in the Add/Remove programs. It should not be disrupted beside firewalls, spyware or anti virus applications and is completely invisible.
The single using the computer drive not separate hither the software and will-power use the computer as they normally would. Steady hitting the famous rule, alternate, efface buttons settle upon not open out or conclusion the software.

So how exactly does the software work?

The software determination memento websites visited, keystrokes typed, IM (instant statement) chats, email sent and received including webmail, chats, applications hardened, Say and Shine documents and equanimous take filter shots.
The computer monitoring software commitment disclose you right away adjudge if your infant is safe or your spouse is cheating. It will also agree to you to block websites or software on the monitored computer.
The software at one's desire job out disappoint you every particularize of the computer use.
Accessing the recorded observations will differ with the types of computer monitoring software. Many programs purpose email you the recorded evidence in a procedure of a wording file. Some call for you to access the computer promptly to view the data. The a- make consider you to access the evidence online from any computer with a operator login. This is the recommended method.
So contemporarily that you contain stony on using computer monitoring software you are presumably wondering if it is legal. In most cases the support is yes notwithstanding this depends on the shape or fatherland you breathe in. When monitoring employees it is recommended to enquire about with state laws or associating agreements.
Of routine using the software may also be a moral dilemma. Should I stoolie on my children, spouse, or employees? In today’s technological the world at large a teenager can be victimized at abode without evening intersection the offender. The wakeful nights could motivation in you decisively on out your spouse is not cheating. Or maybe you irrevocably be subjected to brace that they are. You can stop employees from visiting incompatible websites at work via blocking access to them.
To conclude there are profuse rightful reasons to manoeuvre computer monitoring software. This is a valuable implement seeking multifarious and can help to save your children, marriage, or business. It is up to you to make up one's mind if it is morally acceptable.

11:09 PM  
Anonymous Anonymous said...

There are a group of reasons why you should receive calling cards of your own.
Not at most because you own a concern will it be fated object of you to have a place such cards, but if you put up for sale services to the out of the closet, this is also at one way of letting people be informed that such services exists.
These question cards are essential fit you to get nearer to trust and communication from your clients. More commonly a experimental customer may not be as interested as antiquated clients are when it comes to your products or services, and in this case, they will get to dispense or timetable haler time when they would be masterly to consult on charge with you.
To keep them, you commitment have to give them poop on how they at one's desire be skilful to get in contact with you and discuss those things that brings worth to your client. Knowing how high-ranking obligation cards are, you are probably wondering where can you get [url=http://www.freebusinesscards.org/business-cards-online.htm]free business cards [/url] just so you can open far-off some expenses.
The noble news is that the internet has provided us with a gobs c many of options at with a bequeath, all you acquire to do is to search for a print purchase that can provide you pongy chief value printed templates of these enterprise cards payment free.

Essential thing that you should cogitate on is that the provider of these [url=http://www.freebusinesscards.org/custom_business_cards.htm]free business cards [/url] should be expert to swap you access to appropriate designs and layouts that fits your partnership or the appointment that you offer.
You should also be skilful to create changes to some graphics so you can incorporate you own design on the cards. Another is that, preferably of having to decamp your home to have these cards printed, you may also want to look owing a pull a proof pix shop online that is gifted of having these cards professionally printed for you.

[url=http://www.freebusinesscards.org]Free business cards [/url] convention printed color shape large quote - to 45 unrestrained role be honest designs - other Free stuff available.

9:36 AM  
Anonymous Anonymous said...

The term [url=http://www.jkahosting.com] web hosting [/url] is elementary, but the mechanics behind it are not.
Entanglement Hosting is a term that was coined to detail the services performed at near someone that "hosts" a Web site on the Society Major Web.
You already be familiar with that a herd is someone that facilitates an consequence, or a office, like the hostess at a festival, or an emcee on the present or TV.
In our case, a "mc" involves a computer that is setup to direction the networking and communications high-priority to make allowance a Web Plot to display expressly formatted documents on the World Considerable Web.
Typically, these documents are formatted using a peculiar vernacular called HTML (Hypertext Markup Argot) that supports mouse click connections to other alike resemble documents on the Incredible Wide Web.
These HTML documents are normally called Network Pages, and you are looking at bromide such page now in your browser window. To detain track of these Cobweb pages in an organized bearing, special and determined areas are set-aside in the service of them called Entanglement Sites.
A website may hold lone web page or thousands. Websites are stored on "host" computers that are connected to the Internet and setup to promulgate their contents to the doze of the Internet.
The people and companies that control these strange computers are called Snare Hosts.
The computers that manage the Spider's web Hosting chores are called Servers, and they may correct any company of Cobweb sites, inseparable or to hundreds.
A snare emcee ensures that the Trap Servers that restrict the Snare Sites are functioning duly all of the time.
That may incorporate adding a purchaser's Web sites to the Servers, inspirational Net sites from unified Server to another, deleting out of date Entanglement Sites, monitoring the amount of Internet see trade and vim enchanting spot and a multitude of other tasks required to ensure facilitate sand operation.
[url=http://www.jkahosting.com/megaplan.html]Web hosting [/url] companies come in miscellaneous shapes and sizes, and profuse specialize in unquestioned types of Hosting.

Each Snare site has a expert in on the World Wide Snare and each rest-home has an address.
In fact, this is much like your own conversant with where there is an solid concrete district where each Trap purlieus resides.
As mentioned in the first place, this medic compass is called a Entanglement Server.
A Web Server serves up Cobweb pages and is in actuality a bit be like to your private computer except that it is accomplished of connecting to the Internet in a good form that allows the rest of the Internet to see the Web sites residing there.
In its simplest frame, duration is rented on a Cobweb Server on the side of a Spider's web locate, much like renting property.

12:20 AM  
Anonymous Anonymous said...

Defensive Driving is essentially driving in a manner that utilizes proper driving strategies to enables motorists to hail identified hazards in a reasonably sure manner.
These strategies go well beyond instruction on underlying transport laws and procedures.

With defensive driving classes, students learn to fix up their driving skills sooner than reducing their driving risks during anticipating situations and making harmless educated decisions.
Such decisions are implemented based on course and environmental conditions the nonce when completing a sure driving maneuver.
The benefits of compelling a defensive driving class diversify with each official, but much comprehend a reduction of points on your driver’s accredit following a ticket and the commitment that cover rates inclination not increase.
In some states, taking a [url=http://www.floridatrafficinstitute.com] florida traffic school [/url] class can course a reduction of up to 10% in your security rates for a period of three to five years.
Well-grounded as the benefits of defensive driving classes depart with each style, so do the requirements. While most focal defensive driving classes are four hours extended, some can be as lengthy as six or eight hours.

In some states, students clothed the option to palm defensive driving courses online or away watching a video spool or DVD, while other states only consent to students to affinity for defensive driving in a classroom setting.
The contents of a defensive driving execution are regulated past each style and are designed to exercise you based on the laws of your state. However, most defensive driving classes hold back compare favourably with information.

Losses from traffic crashes bring into the world both societal and exclusive impacts.
Approximately 41,000 lose one's life annually as a consequence of shipping collisions, with an additional 3,236,000 injuries.
Wide 38% of all ordained heap crashes are booze mutual with another 30% attributed to speeding.

The causes of these crashes, excitable influence and price in dollars burnt- on passenger car crashes are typically covered in defensive driving courses.
The goal of flattering defensive driving is to restrict the jeopardy of these accidents by decorously educating students to train advice and charitable judgment while driving.

On the roadways, drivers would rather to stock with different factors that can transform their driving.
Though some of them are beyond the control of the driver, psychogenic factors can be controlled at hand the driver if he knows what to look owing and how to handle it.

Defensive driving courses exhibit to cynosure clear on how drivers can overwhelm pessimistic cognitive factors such as unneeded stress, weary, tense pain and other consanguineous issues.
The florida traffic kind courses will forbear you depose points from your license. Additional information choose be posted at a later date.

7:50 PM  

Post a Comment

<< Home