And what of

When we think back to history, we in the western world are brought up on the history of the Bible and the righteous position of the Jewish people. We are taught little of the growth and beliefs of the other regions of the ancient world. Egypt, Greece and Roman are seen as part of this history. The Persian empire is the enemy and that which is to the north and off to the east are known as trading alliances, maybe not people like those of biblical, Greek or Roman times.

One day a son is born into this culture. Pure of spirit and oh so wise capable of understanding much at the tender age of twelve. Already traveled, one can only imagine he continued to travel, to learn to embrace and to bring light to all he met. To imagine he traveled to the far reaches of the spice routes is so imaginable.

John 1

The Word Became Flesh

1 In the beginning was the Word, and the Word was with God, and the Word was God. 2 He was in the beginning with God. 3 All things came into being through him, and without him not one thing came into being. What has come into being 4 in him was life,* and the life was the light of all people. 5 The light shines in the darkness, and the darkness did not overcome it.

6 There was a man sent from God, whose name was John. 7 He came as a witness to testify to the light, so that all might believe through him. 8 He himself was not the light, but he came to testify to the light. 9The true light, which enlightens everyone, was coming into the world.*

In these words we learn of a teacher who will return. John his cousin, who did not travel east, instead shared beliefs and the letters he had receiving from this learned man. John’s childhood friend who traveled through and around all of the civilizations of ancient times.

Finally the thoughts and teaching from these other ancient lands and people would be merged together with the thoughts of Jesus’ original faith. A new loving and more holistic system of belief could rise binding all of human kind into one chosen people. One group of people not distinct from the other. All loved by the creator.

For some the idea all are equal is not easily, especially still, to accept. This is the great message we should have and must learn. This learned man moved around teaching, performing get things and creating a following embracing all.

The First Commandment

28 One of the scribes came near and heard them disputing with one another, and seeing that he answered them well, he asked him, “Which commandment is the first of all?” 29 Jesus answered, “The first is, ‘Hear, O Israel: the Lord our God, the Lord is one; 30 you shall love the Lord your God with all your heart, and with all your soul, and with all your mind, and with all your strength.’ 31 The second is this, ‘You shall love your neighbor as yourself.’ There is no other commandment greater than these.32 Then the scribe said to him, “You are right, Teacher; you have truly said that ‘he is one, and besides him there is no other’; 33 and ‘to love him with all the heart, and with all the understanding, and with all the strength,’ and ‘to love one’s neighbor as oneself,’—this is much more important than all whole burnt offerings and sacrifices.” 34 When Jesus saw that he answered wisely, he said to him, You are not far from the kingdom of God. After that no one dared to ask him any question.

This is the greatest teaching to love one another, not to create divisions and ferment hate. Embrace each as you wish to be embraced is the true learning we must all learn.

Various articles worth the read

Thomas L. Friedman and James Manyika: The world’s gone from flat, to fast, to deep

Federal Reserve of Atlanta Annual Report One Region. Many Economies.

This time it’s war Keynote address to KnowID, Las Vegas, 25h March 2019.

The Chaps Friday March 29th, 2019

 

Account TakeOver should be the Bankers concern

FASTER PAYMENTS, FASTER FRAUDSTERS

Another article published by PYMNTS.COM causes me to reflect on a discussion I had last we at the Payment Summit organized by the Secure Technology Alliance.  When the US Faster Payments work groups where stood up on e of the working groups focuses on security, yet no particular drive exists to protect the consumer of the corporate treasure from their account being hacked into by some phishing, vishing or other criminal act.  Account takeover will become a much more interesting attack vector.  Moneys will irrevocably flow out of the hacked account and to whatever account the criminal so directs them.

Key word real time gross settlement and faster payments depend on the irrefutability of the funds.  once executed they instantaneously transfer to the receiving party.  What is required is a concerted effort to implement strong multi-factor authentication, at least at the time the transaction is authorized by the sending party.  Some will say the risk is no greater than what exists today when a consumer or treasurer executes a Wire Transfer or any form of transfer between two financial institutions.  This maybe true.  the availability and assumed convenience will as the article described lead to heightened risk.

As I have written in other blogs we need to embrace strong Multi-Factor Authentication.  The standards exist, the security of the device in many case is present.  Relaying parties need to decide security is worth the investment.  They need to recognize the value of  satisfying the consumers’ need to have access to their funds properly protected.

Multi-Factor Authentication – Faster Payments and the Immutability of a Transaction

Biometrics carry risks.

Hacking Our Identity: The Emerging Threats from Biometric Technology

As I skimmed through this article I was reminded of the reality of biometrics.  It is a statistical algorithm designed to compare what was registered to that was just sensed.  It is an imprecise process.  The author reminds us of the importance of our identity in each and every interaction we engage in.  She further ponders the question, of the potential threats to the biometric solutions that countries, people and enterprises are embracing, as we work to address the questions of Authentication and Identification in our complex digital and physical world.

The article asks the questions:

      • Do the countries and enterprises understand the technology and processes used to support biometrics as a means of authentication.
      • Do they appreciate the need to secure and protect this most sensitive of data?
      • Is the data they store able to be used to compromise the individual of the integrity of that which it seeks to protect?
      • Are we at risk of creating a surveillance society?

Finally there is the question of the accuracy of biometric matching.  It is interesting to observe the comparison of the accuracy of biometric matching to PIN or password matching.  We all recognize the challenges of PIN and password.  It is not the concept it is the question of how many complex PIN or passwords is the human mind capable of retaining without writing them down or storing them someplace that can be compromised.

As I have argued in other blogs, the answer must be in the possess of something unique which has a False Reject Rate FRR and a False Accept FAR Rate, both approaching zero.  Clearly the PIN or password has such a characteristic the challenge is in remembering so many.  An object or a thing “Something You Have”, be it a card, phone, watch or bracelet with a Restricted Operating Environment inside e.g. secure element, TEE or TPM, secured using strong cryptography, paired with a biometric makes the most sense.

Of Stakeholders or Shareholders

In South Africa’s Fabled Wine Country, White and Black Battle Over

Elizabeth Warren Proposes Breaking Up Tech Giants Like Amazon and Facebook

Two articles this morning remind us of the challenge of our time. The same challenge of past times. The concentration of wealth and power has and remains why class struggle and revolution often time follow the concentration, which to often is the flaw of capitalize.

When one class can separate itself from another. Those who have the ability to achieve this isolation, forget the pain of those on the bottom.

Stakeholders – the people, clients, customers and workers deserve the same respect and chance for a comfortable life as the shareholders

Distributed Ledger and Things

As I sat to write, I was drawn to the Wikipedia’ Bitcoin article. As I read the story of how it all happened memories and concerns once again flowed through the neurons of my mind. Silk Road and their involvement and the evolution of the value of a Bitcoin, struck me as a magical mystery tour through a world of mathematicians, anarchists, profiteers and speculators.

I then remember reading

an element of a report from the Bank of International Settlement on crypto currency. The picture above is intriguing for those of us who appreciate the complexity of payments. The article gets ever so intriguing when one continues to read and finds this interesting illustration of

the difference between what we all are familiar with and what those who understand DLT and Bitcoin appreciate. The central focus of this new technology is to address one and only one concern. Trust in the intermediary.

I must admit this particular article is not the one I originally intended to speak to. I do though recommend reading it.

The article I had intended to reflect on is Central Bank Cryptocurrencies. In this document they speak to the possibility of the banks issuing a stablecoin. The recent announcement of JPMorgan Chase is one example of such.

This then causes me to reflect on the various use cases and conversations with people about the potential of DLT. I wonder why, at least here in the USA with our judicial and regulatory framework and the rule of law; we would seek to replace the existing intermediaries with a permissionless distributed ledger and the associated consensus mechanisms of a public ledger. There is enormous and growing cost in consensus built on “Proof of Work” and massive duplication of the ledger or as most call it the chain. Be it the electrical cost, the cost of a data center or the specialized computers necessary. The people and companies, the nodes and miners, will expect a reward for their effort.

Which is cheaper, if a reasonable level of trust exists?

Where are we going from here

This is the question. There are those that believe Block-chain and all of the other distributed ledger technologies are the answer to everything. I would suggest one much consider:

    • The level of trust the various parties have in each other.
    • The cost of multiple copies of the distributed ledger.
    • The cost of the consensus mechanism versus a trusted intermediary.
    • The governance required to maintain security, software and specifications.
    • The value and ethical issues of anonymity.

This then begs the question of a permissioned or a permissionless ledger. Which then begs the question of governance and who is responsible to establish the rules.

It is clear there is value in the idea of a distributed ledger. I would suggest caution in deciding if it makes sense for your use case.

      • What are the goals and objectives of the solution?
      • What are the economics of the various approaches?
      • Who are the stakeholders?
      • Who determines the rules and manages change?
      • Can the participants trust an intermediary?
      • Does everyone fear what another could do?

Helping you to understand the answers to these questions is what we do.

Identifiers, Tokens and Authentication

Often times I have wondered why everyone is so enamored with Tokens and Tokenization. Some time ago I begged the question of the broken token in a presentation to the Smart Card Alliance.

My premise is simple.

Identifiers are not authenticators. Replacing the identifier with a token as a result of turning an Identifier, the PAN, Social Security Number or other identifying index value, is a bandage on a festering mistake.

What we need to do is address the challenge of authentication in a convenient and frictionless way. Having to protect an identifier was the issue that created PCI and the whole issue of PII data. The Identifier should not need to be protected. It was and still should be an index and means of recognizing the relationship the relying party has with you. The authentication function is to make sure the person linked to that identifier is you!

User name: Identifier

Password: *********

Was not a bad start. Single factor authentication “what you know”.

Given the number of relying parties we all maintain relationships with, it is time to retire the password; Introducing “what you have” a secure thing (be it a chip card, Fob, Mobile Phone or Personal computer) and exploit the power of cryptography. Then add a second factor, a password or PIN, is a great first step. Changing the PIN or Password to a Biometric is a great leap into a truly secure environment.

The Key is to embrace the first factor “What You Have” a true token.

SCA Workshop Tokenization - 2015

We are here to help you figure out the right approach for your organization.

Multi-Factor Authentication – Faster Payments and the Immutability of a Transaction

Karen Webster
CEO, Market Platform Dynamics
President, PYMNTS.com

Karen,

Last week in your publication I read the article Deep Dive: Security In The Time Of Faster Payments and I had to offer the following thoughts:

The concept of Multi-Factor Authentication is based on the idea of layering multiple authentication techniques on top of each other.

We typically speak of three factors “What You Have”, “What You Know” and “What You Are”.

When we think of “What You Have” we think of a “Thing”.  An object that cannot be replicated or cannot be counterfeited.

An object “a secure computer” that can be upgraded and made more secure as threats like Quantum emerge.
A unique object with a False Reject Rate FRR and a False Accept Rate FAR approaching zero.

In the physical world “the thing” is a card or passport.  You will remember our first discussion, we came to agree the “secure computer” embedded inside provides a future proof mechanism.  In the digital world, we depend on Cryptography.  This Thing, inside our computers, mobile phones and other technologies; many refer to as a ROE “Restricted Operating Environment”.  Technology people may call it a Secure Element, a SIM, an eSIM, a TPM, a TEE, an eUICC or even Security in Chip.  Companies like ARM specialize in creating the design of these things and silicon manufacturers embrace and license their designs.

Today these connected devices (be they: personal computers, identity & payment cards, FOBs, mobiles phones, bracelets, watches and hopefully every IoT device) need to be secured.  This array of cheap ~$1 security circuitry provides a place to create and/or store private keys & secrets keys, perform cryptographic functions and assure the integrity of the BIOS and software being loaded or currently running in these computers.

Think Bitcoin for a second.  The key to its architecture is the Private Key associated with your store of coins.  Lose it and they are lost.  Many people store these in hardware, based on the use of a ROE.

The second factor is all about proving that you are present.  Behavior, location, PIN, fingerprint or passwords are second or even third factors, be they something you know or something you are.

This is what FIDO and what WebAuthN is all about.  Especially since they introducing the security certification regime. This is what the Apple Secure Enclave is and Samsung and others embed into their devices.  This is what we put into payment cards, government identity cards and the Yubico keys we see various enterprises embracing.  This is what Bill Gates started talking about in 2002.  BILL GATES: TRUSTWORTHY COMPUTING

As we move to Faster Payments we must move to Secure payments.  Immutability and irrefutably become key requirements.  To achieve this goal I suggest we need to understand one fundamental security principle.

The First Factor
is Something(s) You Have
My Thing(s)

The Second and Third factors
Prove You Are Present

Storing Biometrics in the Cloud
Creates a Honey Pot
And, begs questions of Privacy

Let me identify myself to My Thing.

Then let My Thing
Authentication my presence to
The Relying Party (Bank or Credit Union)

Authentication, Trust, Identity and Identification

This week the following title caught my eye Why Authentication Needs to Simplified for Users and Organizations. As one of those users who wants authentication to be easier, I was driven to reflect back on what companies have offered as mechanisms to secure this amazing landscape called the World Wide Web or the Internet. Each of the four devices on the right are samples of the primary factor “What You Have”. They date back over 25 years and each included a Secure Element currently referred to as a Restricted Operating Environment ROE. The one with the keyboard was issued to me by my european bank in the 90’s. It was used as step up authentication to secure the transfer of funds.

Cumbersome to say the least. I had to enter a PIN, a number displayed on the screen then type the number displayed on LCD into a field on my personal computer. What I always asked myself, why can’t they integrate that thing inside my keyboard or laptop.

Reflecting forward and thinking about what we have to do today to authenticate ourselves. We are confronted with a myriad of solutions each different each claiming to be the right answer to the wider question. Secret questions, PINs, patterns, passwords, an SMS or email with one time passcode, the Google authenticator, the Microsoft authenticator, the FIDO U2F keys, the Fingerprint sensor on my phone, the camera on my desk top, how I use my mouse, where I am located, is there a cookie in my machine.

On top of all of those commercial solutions, there are numerous demo authenticators clients and prospects have asked me to look at.

Each different.

Each requiring the user to appreciate when and how to use it.

What is the answer. First we must agree on the requirements.

  1. Convenient
  2. Intuitive
  3. Easy to Integrate
  4. Secure

Starting with secure it must be able to offer a unique method of authentication that cannot be spoofed, counterfeit or otherwise compromised. It must have a false accept rate approaching zero and a false reject rate also approaching zero.

As it relates to easy to integrate the people who manage IAM (identity & access management systems – learn this here now), computers, and applications need to be able to quickly and with a minimum of effort, replace what is now used to identify and authenticate the user, with something new.

Intuitive this is the real challenge. There is the variety of users that must be considered. Are they their willing to learn or capable to make the leap, we hope they will?

Finally convenient which demands fast, easy, memorable and even something that is device independent.

How did we get here? Nobility provided individuals letters of introduction, sealed with wax and a signet ring to confirm the origin. This letter assured the attributes, capabilities and identity of the carrier. We trusted because of the seal we recognized

We, one of 7 billion people on this planet, have more contacts on LinkedIn, Facebook and a myriad of other social networks than many towns and cities when a ring and wax was an effective means of authentication.

Today we carry a number of documents. Each designed to provide proof of our identity. We simultaneously expect schools, employers, friends and other agents to be ready to offer proof of our claims. Did we graduate? Did we work there? Are we of good character? Did we received particular certificate?

Insurance companies, airlines, merchants, hotel and banks all provide cards and other means of identity. Each designed to inform someone of our rights, privileges or capabilities.

But, and this is a big but. We do not have an effective and convenient way of sharing these rights, attributes, and privileges on the internet. We let people identify themselves with user Ids and passwords. As the number of digital relations grow the challenge of maintaining secure passwords gets worse. As the challenges of phishing and vishing attacks got more sophisticated the risks, fraud and loses escalated.

We understand these challenges helped to secure card payment systems, were involved in defining new authentication standards and have seen and been exposed to way more ideas than necessary. Happy to help your organization’s secure your consumer and employee relationships.

The Pledge Of Allegiance

Recently I was drawn to learn about the American Pledge of Allegiance and found this timeline expressing the changes that occurred to the pledge as this nation evolved.

From Wikipedia

The Pledge of Allegiance, as it exists in its current form, was composed in August 1892 by Francis Bellamy (1855–1931), who was a Baptist minister, a Christian socialist,[12][13] and the cousin of socialist Utopian novelist Edward Bellamy (1850–1898).  There did exist a previous version created by Captain George T. Balch, a veteran of the Civil War, who later became auditor of the New York Board of Education. Balch’s pledge, which existed contemporaneously with the Bellamy version until the 1923 National Flag Conference, read:

We give our heads and hearts to God and our country; one country, one language, one flag!

1892 (first version)[1]

“I pledge allegiance to my Flag and the Republic for which it stands, one nation, indivisible, with liberty and justice for all.”

1892 to 1923 (early revision by Bellamy)[2]

“I pledge allegiance to my Flag and to the Republic for which it stands, one nation, indivisible, with liberty and justice for all.”

1923 to 1924[3]

“I pledge allegiance to the Flag of the United States and to the Republic for which it stands, one nation, indivisible, with liberty and justice for all.”

1924 to 1954[3]

“I pledge allegiance to the Flag of the United States of America and to the Republic for which it stands, one nation, indivisible, with liberty and justice for all.”

1954 (current version, per 4 U.S.C. §4)[4]

“I pledge allegiance to the Flag of the United States of America, and to the Republic for which it stands, one Nation under God, indivisible, with liberty and justice for all.”

Making you you – A question of Identity

The Economist | Making you you https://www.economist.com/node/21755427?frsc=dg%7Ce

An intriguing question, who defines our identity. Is it the certificate we may or may not have which was issued  issued to our parents at Birth, assuming some entity has that role? Who is this entity with the right to guarantee you are you or I am Philip?

When we hear of the challenges some must deal with in order to vote, we quickly realize it is others who hold the ability to define our identity or for that matter alter or erase our identity.

This article explores the history of systems developed to create means of linking an individual to the assets, obligations and rights they possess. What is clear, it is another who defines and establishes societies means of establishing your identity.

As we move into the world of virtual identity there are those who are and have sought to assume what often was the role of the village elders, the church or most often the government.

Are we the people comfortable with these technocrats, in it for profit, becoming the ordinators of our identity? Clearly advertisers and those seeking to take advantage, happily collect data about us and will happily use this data to push us to buy what they want to sell or take advantage of us in ways we may not be able to recover from.

For those of you incline to think about the question of identity, I recommend reading what The Economist has to say.

As Facebook Raised a Privacy Wall

NYTimes: As Facebook Raised a Privacy Wall, It Carved an Opening for Tech Giants

As Facebook Raised a Privacy Wall, It Carved an Opening for Tech Giants https://nyti.ms/2GqnbC9

As I read this article my mind asked the question what drives an organization and its American employees to forget they are American citizen’s with responsibilities to protect this nation from the acts of our enemies.

Excess profits, what other motivation could there be. The one motivation which is and will remain the greatest threat to society, the environment and our grandchildrens’ future.

Be it the concentration of power which drives excess profits or the reduction of quality, weight, volume or size, simply to maintain price and margin the shareholder will be served after senior management take its plenty. Stakeholders – client and employees come second, after the key executive and strategic shareholders are rewarded.

Russian’s and our other enemies will find our weaknesses and take advantage deluding us with propaganda and lies, all to achieve their aims.

Disruption or the Reality of Legacy

Often times people speak of disruption as this traumatic thing being imposed upon them, their industry or society. Yet, if we look under the covers disruption more than likely is all about a competitor, not locked into a legacy approach, approaching the market with different tools.

The world of payments, as so many others, have implemented technology then gone on to enhance or update multiple times. Each time, someone or some group of people, had to adapt therefore invest to keep up. More often than not, a community would decide to hold on to what they built, sometime ago, hoping no one tried to disrupt the status quo.

With payment, the need to embrace more effective approaches parallels the robustness and frequency of transactions. It also parallels the desire of sellers to do business with anonymous buyers. A lack of trust and a need to reduce the amount of cash we carry drove markets to promissory notes. These promissory notes further evolved, as trusted intermediaries entered the market and created more efficient methods of providing that guarantee of payment. If you are still a little in the dark about what these are, you can Google questions such as “what is a promissory note?” “What are the elements of a promissory note?”, etc. so you are fully up-to-date with the information that you need.

Not wanting to duplicate what is already written about the history of money and payments we can jump forward through the paper phase to where we are in North America: Cash, cards, some checks and electronic debits & credits.

If we look inside the evolution of legacy. We find what we have, is a stumbling block, holding innovation back. We need to decide to adapt what exists or remove and replace.

To connect or disconnect this is the quandry

Pymnts.com in conjunction with Visa published a study of the connectedness of the American population. While reading I wondered how they could identify 36% of our population as Super Connected Consumers. Thinking this profile might be people like myself. I began to wonder how could such a large percent of the population be so connected.

Reaching out to the publisher it became clear this report was well developed and the sample matched the citizen of this country. This led me to wonder about our connected world and how over 42 years I have gone from carrying a beeper to having thermostats, phones, watches, computers, Alexa, TVs, security systems and who knows what else connected somehow to that great network we once dreamed about.

What happened

Reading about the history of the NRA I was surprised and pleased to learn of the original purpose of the NRA, Marksmanship.  It was all about assuring the effective use of firearms. As I continued to read I was further impressed when I read the following from:  https://en.wikipedia.org/wiki/National_Rifle_Association

Karl Frederick, NRA President in 1934, during congressional NFA hearings testified “I have never believed in the general practice of carrying weapons. I seldom carry one. … I do not believe in the general promiscuous toting of guns. I think it should be sharply restricted and only under licenses.” Four years later, the NRA backed the Federal Firearms Act of 1938.

As I read the second amendment, the NRA President seems to embrace the first clause.

A well regulated Militia, being necessary to the security of a free State, the right of the people to keep and bear Arms, shall not be infringed.

The NRA focus seems to have been on making sure those who bear arms are properly trained. Clearly a principal roll of a regulated militia is the training of its members.

A key word in the initial phrase of the Second amendment is “regulated”.  This word means:

control or supervise (something, especially a company or business activity) by means of rules and regulations.

Reading more about the history of this organization there was a unfortunate strategic shift.

Until the middle 1970s, the NRA mainly focused on sportsmen, hunters and target shooters, and downplayed gun control issues. However, passage of the GCA galvanized a growing number of NRA gun rights activists, including Harlon Carter. In 1975, it began to focus more on politics and established its lobbying arm, the Institute for Legislative Action (NRA-ILA), with Carter as director. The next year, its political action committee (PAC), the Political Victory Fund, was created in time for the 1976 elections. The 1977 annual convention was a defining moment for the organization and came to be known as “The Cincinnati Revolution”. Leadership planned to relocate NRA headquarters to Colorado and to build a $30 million recreational facility in New Mexico, but activists within the organization whose central concern was Second Amendment rights defeated the incumbents and elected Carter as executive director and Neal Knox as head of the NRA-ILA. Insurgents including Harlon and Knox had demanded new leadership in part because they blamed incumbent leaders for existing gun control legislation like the GCA and believed that no compromise should be made

The question – why this shift away from Marksmanship, hunting and sportsmen?
How do gun manufactures play into this shift? How does the desire for profit, stimulate a shift to advocating gun ownership?

I then read a bit of Harlon Carter’s history. Convicted of murder and one can sense a racist attitude. Maybe the manufacturers came later and the white supremacist came first.

We America need to take politics out of the discussion and commission a panel of professional English language grammar scholars.  We should  ask them to carefully read the language of the second amendment and provide clarity as to what people, at the time it was written, meant if there is a strict interpretation of the Grammar. This thought led to a search for some previously prepared analysis of the construction of the second amendment.

“A well regulated Militia, being necessary to the security of a free State, the right of the people to keep and bear Arms, shall not be infringed.”

https://www.law.cornell.edu/wex/second_amendment

guns and grammer
The_Commonplace_Second_Amendment

Clearly there are multiple interpretations, ranging from the objective of “Maintain a well regulated militia” to the objective of “the right of the people to keep and bear Arms”.

I personally am of the view that what one of these articles described as the “Collective Rights Approach”

Given these multiple interpretations, we the people as the majority of the people should vote and decide which we seek to be the appropriate interpretation.

The State of Our Nation

The three of you represent my interests as members of the legislative branch of our country. I have written to each of you at various moments in time expressing my concerns on specific issues. On this Thanksgiving Day I write not of one issue but of many.

I worry about:

• The cost and state of our Healthcare system
• Safety of our citizens be they at school, temple, church, out for the evening or at work.
• The inability to properly manage immigration be it legal or illegal
• The new trade wars that are emanating from these tariffs we are imposing on our trading partners.
• The need to preserve and protect the members of the fourth estate and to make sure they have the ability to, as appropriate and with the right level of decorum, forcefully question our appointed and elected leaders.
• The vicious and untampered attacks on the judicial and legislative branches of our government by the leader of the third branch of our government.
• The continued erosion of our position as a world leader.
• The loose of respect we are sustaining around the globe, especially with our friends and allies.
• The lack of confidence verbally expressed in the work and working of our dedicated intelligence services.
• The inability to express our disappointment when the leader of Saudi Arabia orders the killing of a US Resident.
Yes, I understand the implications and recognize this should be limited to a slap on the wrist not all out sanctions, they should understand our disapproval and national disappointment in their willful act.
• The continued warfare happening on this planet and the continued animosity, religious intolerance, tribal hatred, racial hatred, and economic inequities of our global economy.
• The concentration of wealth & power.
• The reduction in competition and belief in excess profit at the expense the employees and citizens.
I could continue and I am sure all three of you are fully aware of and can add items to this list I could not even imagine.

Our two-party system was designed in such a manner that consensus would be the result and that our government would seek to address the will of the majority. Unfortunately, the way our system has evolved: the will of the minority, the company with the loudest voice, the affiliations with the most money to contribute to the reelection of you are your colleagues and those who work as lawyers and lobbyist dominate the halls of our capital and the results of your deliberations.

I implore the three of you to work collectively to bring order, respect and decorum to the workings of our government and make sure that the freedoms, liberties and rights our constitution established are respected and maintained.

CC:
Senator Purdue
Senator Isakson
Representative Scott