Why What We Use as Money Matters, Our Economic and Philosophical Treatise, is Now Available

Our long awaited Treatise on Economy and Philosophy, Why What We Use as Money Matters, is now available in various digital formats at Smashwords.com and on Kindle at Amazon.com.  With any luck, we will have a print version available before we leave for the Southern Hemisphere.

Why What We Use as Money MattersWhat kind of book is this?  It is largely up to the reader to decide.  For us, it is the fruit of two years of wrestling with some of life’s deeper questions with regards to Economics, Politics, and Philosophy.  It has answered many of them and, in turn, has raised other issues, for in our exploration, as you will see, the current state of affairs is laid bare for all to examine, and our recommended courses of action may be unpalatable for many.

Nevertheless, there it is, altogether thick and challenging, yet refreshingly simple, the key to reversing the effects of climate change.Why What We Use as Money Matters

In a sense, it culminates the first phase of what we set out to do here at The Mint.  There will be more to come, but for the time being, we leave you to ponder the following brief excerpt:

“The natural world strives daily to achieve a perfect state of balance. Events and occurrences that, taken by themselves, appear chaotic and devoid of meaning are together part of a constant rebalancing of the earth’s delicate state. Each event is a splash of color across an oppressive gray sky that hints at a rainbow that will soon appear. “

 

The Snowden Revelations: Keeping the NSA in Perspective via Stratfor

While the world continues to watch and wait for Eric Snowden’s next move, we have watched with bewilderment from afar.  We has baffled us is how Mr. Snowden’s revelations about the NSA’s programs qualify as shocking.

To anyone who has stopped to ponder the phenomenon of the Internet, it should have been abundantly clear long ago that the structure of Internet itself is, among other things, a giant information gathering tool.  To assume that those in power would not make use of this tool towards their ends is to deny the power of self interest.

However, while programs such as PRISM and many others which surely exist are disturbing, they are not without precedent in the American Imperial experience.  In many respects, the Internet, while greatly facilitating the gathering of information, has likely served to make the mission of the NSA with respect to evaluating such data infinitely more difficult.

The following essay, Keeping the NSA in Perspective by George Friedman, is republished here with permission of Stratfor.

As always, Mr. Friedman does a fine job of providing the historical context for the current NSA/Snowden fiasco as well as presenting both the operational and constitutional difficulties not only of surveillance programs such as PRISM, but also of waging a war with such vague objectives as the current War on Terror seems to have.

Without further ado, Mr. Friedman…

By George Friedman

In June 1942, the bulk of the Japanese fleet sailed to seize the Island of Midway. Had Midway fallen, Pearl Harbor would have been at risk and U.S. submarines, unable to refuel at Midway, would have been much less effective. Most of all, the Japanese wanted to surprise the Americans and draw them into a naval battle they couldn’t win.

The Japanese fleet was vast. The Americans had two carriers intact in addition to one that was badly damaged. The United States had only one advantage: It had broken Japan’s naval code and thus knew a great deal of the country’s battle plan. In large part because of this cryptologic advantage, a handful of American ships devastated the Japanese fleet and changed the balance of power in the Pacific permanently.

This — and the advantage given to the allies by penetrating German codes — taught the Americans about the centrality of communications code breaking. It is reasonable to argue that World War II would have ended much less satisfactorily for the United States had its military not broken German and Japanese codes. Where the Americans had previously been guided to a great extent by Henry Stimson’s famous principle that “gentlemen do not read each other’s mail,” by the end of World War II they were obsessed with stealing and reading all relevant communications.

The National Security Agency evolved out of various post-war organizations charged with this task. In 1951, all of these disparate efforts were organized under the NSA to capture and decrypt communications of other governments around the world — particularly those of the Soviet Union, which was ruled by Josef Stalin, and of China, which the United States was fighting in 1951. How far the NSA could go in pursuing this was governed only by the extent to which such communications were electronic and the extent to which the NSA could intercept and decrypt them.

The amount of communications other countries sent electronically surged after World War II yet represented only a fraction of their communications. Resources were limited, and given that the primary threat to the United States was posed by nation-states, the NSA focused on state communications. But the principle on which the NSA was founded has remained, and as the world has come to rely more heavily on electronic and digital communication, the scope of the NSA’s commission has expanded.

What drove all of this was Pearl Harbor. The United States knew that the Japanese were going to attack. They did not know where or when. The result was disaster. All American strategic thinking during the Cold War was built around Pearl Harbor — the deep fear that the Soviets would launch a first strike that the United States did not know about. The fear of an unforeseen nuclear attack gave the NSA leave to be as aggressive as possible in penetrating not only Soviet codes but also the codes of other nations. You don’t know what you don’t know, and given the stakes, the United States became obsessed with knowing everything it possibly could.

In order to collect data about nuclear attacks, you must also collect vast amounts of data that have nothing to do with nuclear attacks. The Cold War with the Soviet Union had to do with more than just nuclear exchanges, and the information on what the Soviets were doing — what governments they had penetrated, who was working for them — was a global issue. But you couldn’t judge what was important and what was unimportant until after you read it. Thus the mechanics of assuaging fears about a “nuclear Pearl Harbor” rapidly devolved into a global collection system, whereby vast amounts of information were collected regardless of their pertinence to the Cold War.

There was nothing that was not potentially important, and a highly focused collection strategy could miss vital things. So the focus grew, the technology advanced and the penetration of private communications logically followed. This was not confined to the United States. The Soviet Union, China, the United Kingdom, France, Israel, India and any country with foreign policy interests spent a great deal on collecting electronic information. Much of what was collected on all sides was not read because far more was collected than could possibly be absorbed by the staff. Still, it was collected. It became a vast intrusion mitigated only by inherent inefficiency or the strength of the target’s encryption.

Justified Fear

The Pearl Harbor dread declined with the end of the Cold War — until Sept. 11, 2001. In order to understand 9/11’s impact, a clear memory of our own fears must be recalled. As individuals, Americans were stunned by 9/11 not only because of its size and daring but also because it was unexpected. Terrorist attacks were not uncommon, but this one raised another question: What comes next? Unlike Timothy McVeigh, it appeared that al Qaeda was capable of other, perhaps greater acts of terrorism. Fear gripped the land. It was a justified fear, and while it resonated across the world, it struck the United States particularly hard.

Part of the fear was that U.S. intelligence had failed again to predict the attack.  The public did not know what would come next, nor did it believe that U.S. intelligence had any idea. A federal commission on 9/11 was created to study the defense failure. It charged that the president had ignored warnings. The focus in those days was on intelligence failure. The CIA admitted it lacked the human sources inside al Qaeda. By default the only way to track al Qaeda was via their communications. It was to be the NSA’s job.

As we have written, al Qaeda was a global, sparse and dispersed network. It appeared to be tied together by burying itself in a vast new communications network: the Internet. At one point, al Qaeda had communicated by embedding messages in pictures transmitted via the Internet. They appeared to be using free and anonymous Hotmail accounts. To find Japanese communications, you looked in the electronic ether. To find al Qaeda’s message, you looked on the Internet.

But with a global, sparse and dispersed network you are looking for at most a few hundred men in the midst of billions of people, and a few dozen messages among hundreds of billions. And given the architecture of the Internet, the messages did not have to originate where the sender was located or be read where the reader was located. It was like looking for a needle in a haystack. The needle can be found only if you are willing to sift the entire haystack. That led to PRISM and other NSA programs.

The mission was to stop any further al Qaeda attacks. The means was to break into their communications and read their plans and orders. To find their plans and orders, it was necessary to examine all communications. The anonymity of the Internet and the uncertainties built into its system meant that any message could be one of a tiny handful of messages. Nothing could be ruled out. Everything was suspect. This was reality, not paranoia.

It also meant that the NSA could not exclude the communications of American citizens because some al Qaeda members were citizens. This was an attack on the civil rights of Americans, but it was not an unprecedented attack. During World War II, the United States imposed postal censorship on military personnel, and the FBI intercepted selected letters sent in the United States and from overseas. The government created a system of voluntary media censorship that was less than voluntary in many ways. Most famously, the United States abrogated the civil rights of citizens of Japanese origin by seizing property and transporting them to other locations. Members of pro-German organizations were harassed and arrested even prior to Pearl Harbor. Decades earlier, Abraham Lincoln suspended the writ of habeas corpus during the Civil War, effectively allowing the arrest and isolation of citizens without due process.

There are two major differences between the war on terror and the aforementioned wars. First, there was a declaration of war in World War II. Second, there is a provision in the Constitution that allows the president to suspend habeas corpus in the event of a rebellion. The declaration of war imbues the president with certain powers as commander in chief — as does rebellion. Neither of these conditions was put in place to justify NSA programs such as PRISM.

Moreover, partly because of the constitutional basis of the actions and partly because of the nature of the conflicts, World War II and the Civil War had a clear end, a point at which civil rights had to be restored or a process had to be created for their restoration. No such terminal point exists for the war on terror. As was witnessed at the Boston Marathon — and in many instances over the past several centuries — the ease with which improvised explosive devices can be assembled makes it possible for simple terrorist acts to be carried out cheaply and effectively. Some plots might be detectable by intercepting all communications, but obviously the Boston Marathon attack could not be predicted.

The problem with the war on terror is that it has no criteria of success that is potentially obtainable. It defines no level of terrorism that is tolerable but has as its goal the elimination of all terrorism, not just from Islamic sources but from all sources. That is simply never going to happen and therefore, PRISM and its attendant programs will never end. These intrusions, unlike all prior ones, have set a condition for success that is unattainable, and therefore the suspension of civil rights is permanent. Without a constitutional amendment, formal declaration of war or declaration of a state of emergency, the executive branch has overridden fundamental limits on its powers and protections for citizens.

Since World War II, the constitutional requirements for waging war have fallen by the wayside. President Harry S. Truman used a U.N resolution to justify the Korean War. President Lyndon Johnson justified an extended large-scale war with the Gulf of Tonkin Resolution, equating it to a declaration of war. The conceptual chaos of the war on terror left out any declaration, and it also included North Korea in the axis of evil the United States was fighting against. Former NSA contractor Edward Snowden is charged with aiding an enemy that has never been legally designated. Anyone who might contemplate terrorism is therefore an enemy. The enemy in this case was clear. It was the organization of al Qaeda but since that was not a rigid nation but an evolving group, the definition spread well beyond them to include any person contemplating an infinite number of actions. After all, how do you define terrorism, and how do you distinguish it from crime?

Three thousand people died in the 9/11 attacks, and we know that al Qaeda wished to kill more because it has said that it intended to do so. Al Qaeda and other jihadist movements — and indeed those unaffiliated with Islamic movements — pose threats. Some of their members are American citizens, others are citizens of foreign nations. Preventing these attacks, rather than prosecuting in the aftermath, is important. I do not know enough about PRISM to even try to guess how useful it is.

At the same time, the threat that PRISM is fighting must be kept in perspective. Some terrorist threats are dangerous, but you simply cannot stop every nut who wants to pop off a pipe bomb for a political cause. So the critical question is whether the danger posed by terrorism is sufficient to justify indifference to the spirit of the Constitution, despite the current state of the law. If it is, then formally declare war or declare a state of emergency. The danger of PRISM and other programs is that the decision to build it was not made after the Congress and the president were required to make a clear finding on war and peace. That was the point where they undermined the Constitution, and the American public is responsible for allowing them to do so.

Defensible Origins, Dangerous Futures

The emergence of programs such as PRISM was not the result of despots seeking to control the world. It had a much more clear, logical and defensible origin in our experiences of war and in legitimate fears of real dangers. The NSA was charged with stopping terrorism, and it devised a plan that was not nearly as secret as some claim. Obviously it was not as effective as hoped, or the Boston Marathon attack wouldn’t have happened. If the program was meant to suppress dissent it has certainly failed, as the polls and the media of the past weeks show.

The revelations about PRISM are far from new or interesting in themselves. The NSA was created with a charter to do these things, and given the state of technology it was inevitable that the NSA would be capturing communications around the world. Many leaks prior to Snowden’s showed that the NSA was doing this. It would have been more newsworthy if the leak revealed the NSA had not been capturing all communications. But this does give us an opportunity to consider what has happened and to consider whether it is tolerable.

The threat posed by PRISM and other programs is not what has been done with them but rather what could happen if they are permitted to survive. But this is not simply about the United States ending this program. The United States certainly is not the only country with such a program. But a reasonable start is for the country that claims to be most dedicated to its Constitution to adhere to it meticulously above and beyond the narrowest interpretation. This is not a path without danger. As Benjamin Franklin said, “They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.”

The Mint Money Supply Digest – July 15, 2013

7/15/2013 Portland, Oregon – Pop in your mints…

Now that summer is in full swing there are few surprises on the horizon and the world, it would appear, is resigned to reluctantly following the current credit cycle on its dramatic upward trajectory. While we do not believe that the centrally managed credit cycles of today are beneficial (indeed, they are quite the opposite) nor do we believe in money in its present form (as long-suffering readers well know), the centrally managed credit cycle is quite predictable and in this sense appeals to our inner laziness.

Some five years ago, the Federal Reserve began doing everything in their power to stimulate credit, as the swoon of 2008, induced by a series of blind 25 basis point hikes in the Fed’s rate target, threatened to choke off the lifeblood of the debt based monetary system.  At the time, we postulated that it would be roughly 39 months before the average man on the street began to feel stimulated the way the Fed’s architects imagined he would.

Now, 60 months on, consumer credit is finally picking up, on net, and everywhere you look the debt soaked economy is on a high.  The money is so hot one risks a scorched retina by merely looking upon it as it flashes through the bond, equity, and commodity charts.

Unfortunately, beyond the glare, the debt based money supply has left some major sinkholes in the economy that either fiscal or monetary policy can patch.  The trick to safely navigating through the coming phase of the most recent edition of credit madness sponsored by central banks across the globe will be to avoid being engulfed by the sinkholes, for at this point there exists not the means nor political will to do so.

Where are the sinkholes?  Alas, if we knew for certain, we would long since have laid our pen to rest in favor of a life of leisure.  However, if we were pressed to guess, we would watch for them to appear under any patch of economic mass holding large sums of cash or long term debt instruments.

Given that criteria, the central banks themselves come to mind.  It is they that will remain trapped in concrete as human progress speeds ahead.

Stay tuned and Trust Jesus!

Stay Fresh!

Key Indicators for July 15, 2013 

Malala Yousafzai addresses the UN as a 16 year old peacemaker

Malala Yousafzai, the Pakistani girl who survived a vicious attack by Taliban gunmen as she and her friends attempted to exercise their right to go to school, was given the opportunity of a lifetime yesterday as she addressed a youth delegation at the United Nations’ general assembly room on her 16th birthday.  Her address to the UN, which can be seen below in its entirety, will go down as one of the greatest in recent memory.

Many in the West will no doubt be stricken by the fact that there are places in the world where girls are not allowed to attend school even when the facilities exist.  We were stricken for a different reason:  Malala is not only one who has stood up for educational rights, she is a 16 year old peacemaker.

In the speech she cites Gandhi, Martin Luther King, and others as her inspiration to pursue peaceful methods of protest.  In doing so, she has become a living example of two truths:

That violence is a symptom of cowardice, and that the peacemakers shall be called the children of God.

A New Season is Upon the Earth

7/11/2013 Portland, Oregon – Pop in your mints…

The summer is in full swing here in the Northwest.  We have recently sent the manuscript for our mini treatise off to perhaps the only publisher that aligns ideologically with its many and varied themes; Laissez Faire Books.

As we await a response, we are directing our creative energies into the construction of a playground/deck/Gaudi-esque structure upon some otherwise idle ground near the back of the property.  As someone who stares at screens for a living, wielding a circular saw and power screwdriver is nothing short of exhilarating.

There is something about creating something from nothing that brings with it a contentment only those who have done it can explain.  It is to work outside the confines of time and space while at the same time yielding to their limitations.  In the best of moments, it brings us closer to the divine.

In addition to our power tool therapy, we have been seeking funding for a number of projects that have come across our radar.  While our efforts to this point have been categorically unsuccessful, we have a feeling that is about to change.  We have had the feeling that things are about to break loose for some time now.

Yesterday, this feeling was confirmed in the most unexpected of settings, a Board Finance Committee.  In the middle of the meeting, as we were punting around various ideas and cost savings measures, a prophet came in and declared a new season had come upon the world, a season in which the plans of Yahweh, those that have been stayed for various reasons, would now come to pass.  That the righteous would have resources thrust into their hands.  This season began in early July.

With that, all discussion ceased and we simply came into agreement in prayer over the matter as a Committee, and the meeting was adjourned.  It was the most unique committee meeting we have ever attended.

It must be said that there is great relief in prayer.  While simply praying is no guarantee that funds will appear or that plans will come to pass, it is a guarantee that the matter is firmly in Yahweh’s hands, leaving the outcome, whatever it may be, a victory for the Kingdom of Heaven.

In other words, prayer brings peace, and in this case the confirmation of a notion that The Lord has laid upon us for the past six months. A new season in the spiritual realm has arrived.

It is crucial that we open our eyes, or we shall remain blind.  This was made clear to us in a vision we had yesterday (yes, visions are returning as well!) in which we saw a field and a man standing at the end of it.  The man was looking through a field of vision that allowed him to see a mere 1% of the immense richness of the land in front of him.

This represented the blindness inherent in seeking answers in numbers, which provides one a viewpoint that is 1% reality and 99% fiction.  If we can learn to see past the 1% and step forward into the field before us, the 99%, the abundance of Yahweh’s supply for us, appears as if out of nowhere…yet it has been there all along.

Such is the blindness of those who decide based on numbers alone, for the numbers are at best, a trailing indication of words, decisions, and actions long past. At worst, they are a stumbling block and a snare.  For renewal an growth to take place, there must be a complete separation from the current concept of money and the reality of the natural world.  This separation is just now beginning to take place.

Finally, we are also making preparations for our long delayed annual journey to Bolivia, where we hope to advance a project that has long been on our hearts:

The Night John the Baptist Died

Stay tuned and Trust Jesus!

Stay Fresh!

David Mint

Email: davidminteconomics@gmail.com

Key Indicators for July 11, 2013

Copper Price per Lb: $3.16
Oil Price per Barrel:  $104.63
Corn Price per Bushel:  $7.16
10 Yr US Treasury Bond:  2.57%
Mt Gox Bitcoin price in US:  $86.90
FED Target Rate:  0.09%  ON AUTOPILOT, THE FED IS DEAD!
Gold Price Per Ounce:  $1,286
MINT Perceived Target Rate*:  0.25%
Unemployment Rate:  7.6%
Inflation Rate (CPI):  0.1%
Dow Jones Industrial Average:  15,461
M1 Monetary Base:  $2,623,800,000,000
M2 Monetary Base:  $10,629,300,000,000

An Agnostic Moment – Episode 4 arrives with the Big Seven

Episode 4 in Craig Birchfield’s entertaining and informative series, An Agnostic Moment, brings to light a series of arguments which he dubs the Big Seven which are like flashing billboards on the highway of life constantly pointing us towards the divine.  Enjoy!

Why Short-Term Interest Rate Management is Harmful to the Economy: The Unseen Funding Dynamic

Ben Bernanke Testimony
Pondering the folly of Short-term interest rate management

7/1/2013 Portland, Oregon – Pop in your mints…

There are days when things are muddled and days when things are so painfully apparent it disturbs us that we did not happen upon it sooner.  Today is one of the latter.

We have been pondering the failure of centralized planning.  While the evidence is clear that centralized planning is a failure, pointing to the reasons why can prove elusive.  The same holds for our working theory that in order for the activities of mankind to be in balance with the natural world, the monetary premium, a concept that is commonly referred to as money, must be affixed to the natural realm.

Today, a revelation regarding the problem with fixing short-term interest rates (or any interest rate for that matter) came upon us which we will share with you now.  We believe that the revelation deals with both the problem of short-term interest rate fixing as well as the larger issue of the placement of the monetary premium, for the two are linked.

The revelation is the following:  Imagine you are a banker who needs to fund a loan.  In order to fund this loan, you would presumably need to have the money available with which to fund it.  This is simple logic, however, in the real world of banking, the decision of whether or not to fund a loan is completely disconnected from the availability of funds, which is primarily determined by the overnight funding markets which, in turn, are completely reliant upon short-term interest rates.

In a world that followed the rules of financial physics, the short-term interest rates would be completely dependent upon the availability of funds in the system.  However, the centralized management of interest rates makes this critical data point, which would otherwise provide a snapshot of the amount of capital in an economic system which is held in liquid form and available for deployment, irrelevant.  The amount of capital available in system can be determined on whim, such is the power of centralized discount rate management.

As such, the ability of the banker to fund the loan is not dependent upon an availability of funds that represents the amount of capital available in the real world, rather, his ability to fund the loan is completely dependent upon the borrower’s ability to pay, the size of the loan, and the structure of the bank’s balance sheet.

The three criteria above are important, as any underwriter will tell you, but the invisible fourth criteria, the true availability of the funds for the loan, what we call the funding dynamic, is completely ignored in the following fashion:

When the short-term interest is managed to be low, as is the case currently, any borrower who has the capacity to pay and has a lending need that fits well with a certain bank’s loan mix is extremely likely to get funded, regardless of whether or not the economics system as a whole has the capital available to fund his or her loan.  When the short-term interest rate is managed to be high, as it was in the early 1980’s in the US, funding any loan, regardless of the ability to pay and fit with then bank’s balance sheet, becomes impossible to fund.

In both cases, both the borrower and the banker are left completely in the dark as to whether or not there exists the necessary capital stock or productive capacity in the economy for the funds to be deployed in the manner that the borrower envisions, for the short-term interest rate signal has been genetically modified to send a common signal to all participants.

Unfortunately, it is a signal that blinds everyone to the facts of the situation.  For many are the hopes, dreams, and ideas of mankind, but it is the funding dynamic which keeps these hopes, dreams, and ideas in harmony with the natural world upon which we all depend.

Right now, we are floating in the clouds, completely disconnected from reality.  The landing caused by the next round of high rates, via a natural rebalancing of accounts or further genetic modification of the short-term rates, will be very hard indeed.

The funding dynamic is so delicate that mankind cannot hope to optimize genetically modification, for when left alone, it is optimized by definition.  Again, by definition, every attempt to modify will bring about sub-optimal results.

As with all complex economic and political systems, dissent is information, and serves to manage the system’s outputs while at the same time increasing the resiliency of the system, making it less susceptible to shocks.

Centralized short-term interest rate management must be abandoned before it is too late, for it is leading the activities of mankind towards a dangerous showdown with the limitations of the natural world.

Stay tuned and Trust Jesus.

Stay Fresh!

David Mint

Email: davidminteconomics@gmail.com

Key Indicators for July 1, 2013

Copper Price per Lb: $3.14
Oil Price per Barrel:  $97.99
Corn Price per Bushel:  $6.55
10 Yr US Treasury Bond:  2.48%
Mt Gox Bitcoin price in US:  $89.74
FED Target Rate:  0.09%  ON AUTOPILOT, THE FED IS DEAD!
Gold Price Per Ounce:  $1,253
MINT Perceived Target Rate*:  0.25%
Unemployment Rate:  7.6%
Inflation Rate (CPI):  0.1%
Dow Jones Industrial Average:  14,975
M1 Monetary Base:  $2,452,200,000,000
M2 Monetary Base:  $10,628,800,000,000