Wednesday, July 28, 2010

If New York State did a PEFA how would be its rating?

The payroll indicator would certainly be a 'D';
As Gov. David A. Paterson calls lawmakers back to work on the budget this week, he has announced that the fiscal situation is so serious that he must begin laying off state workers. But there is one wrinkle, as officials try to pare government spending: No one knows for sure how big the state work force actually is.

That is because the state has not one but two public payrolls.

One is controlled by the governor, encompassing about 131,000 employees, who toil for agencies like the Health Department, the parks department and the Department of Motor Vehicles. That payroll has shrunk by about 25 percent in the last two decades — so has the much smaller legislative payroll — and usually shoulders the brunt of layoffs.

The other lies beyond the direct control of the governor and includes perhaps 163,000 more workers employed by independent public authorities and agencies — though that number is an estimate, because not all authorities have been reporting their payrolls to a central state registry. And projections of state employment by the federal government do not always match the state government’s figures. The work force beyond the governor’s control has largely bucked the statewide retrenchment, according to a review compiled by The New York Times...

Legislation last year forced them for the first time to turn over their employment data to a central registry. But that represents only current staffing, making it difficult to determine whether the authorities have been shrinking or expanding over time.

Why is Peter Orszag leaving?

Mr. Orszag, you may recall, was the administration’s main proponent of “bending the curve” on health care expenditures. Frustrated that House Democrats wouldn’t accept some painful cost-cutting measures in the new health care law, Mr. Orszag pushed for and won a controversial provision to create something called the Independent Payment Advisory Board. This is an outside commission of 15 appointees who will, beginning in 2014, identify cuts to Medicare if the plan exceeds a preset rate for growth. Congress then has to either approve the cuts or propose an alternative.

The significance of this new advisory board goes well beyond the immediate question of how to rein in Medicare costs. Mr. Orszag, who declined to be interviewed, has said that the board represented, for Congress, the “single-biggest yielding of power to an independent entity since the creation of the Federal Reserve.” In other words, the Medicare Board isn’t only a means of cutting government spending; it is a means, too, of wresting the constitutional responsibility for budgeting away from powerful committee chairmen.

The Medicare Board may be the most striking example of this strategy, but it is hardly the only one. Mr. Orszag also helped broker the creation of an 18-member debt commission that will offer specific alternatives for re-ordering the federal budget. The administration has also proposed a bill — known in the punchy language of Washington as “expedited rescission authority” — that would effectively give the president the power to strike out spending items after the budget has been approved.
-Budget Chief tried to tilt power to Executive Branch

Tuesday, July 20, 2010

Can WikiLeaks model work for the government

He had come to understand the defining human struggle not as left versus right, or faith versus reason, but as individual versus institution. As a student of Kafka, Koestler, and Solzhenitsyn, he believed that truth, creativity, love, and compassion are corrupted by institutional hierarchies, and by “patronage networks”—one of his favorite expressions—that contort the human spirit. He sketched out a manifesto of sorts, titled “Conspiracy as Governance,” which sought to apply graph theory to politics. Assange wrote that illegitimate governance was by definition conspiratorial—the product of functionaries in “collaborative secrecy, working to the detriment of a population.” He argued that, when a regime’s lines of internal communication are disrupted, the information flow among conspirators must dwindle, and that, as the flow approaches zero, the conspiracy dissolves. Leaks were an instrument of information warfare.

These ideas soon evolved into WikiLeaks. In 2006, Assange barricaded himself in a house near the university and began to work. In fits of creativity, he would write out flow diagrams for the system on the walls and doors, so as not to forget them. There was a bed in the kitchen, and he invited backpackers passing through campus to stay with him, in exchange for help building the site. “He wouldn’t sleep at all,” a person who was living in the house told me. “He wouldn’t eat.”

As it now functions, the Web site is primarily hosted on a Swedish Internet service provider called PRQ.se, which was created to withstand both legal pressure and cyber attacks, and which fiercely preserves the anonymity of its clients. Submissions are routed first through PRQ, then to a WikiLeaks server in Belgium, and then on to “another country that has some beneficial laws,” Assange told me, where they are removed at “end-point machines” and stored elsewhere. These machines are maintained by exceptionally secretive engineers, the high priesthood of WikiLeaks. One of them, who would speak only by encrypted chat, told me that Assange and the other public members of WikiLeaks “do not have access to certain parts of the system as a measure to protect them and us.” The entire pipeline, along with the submissions moving through it, is encrypted, and the traffic is kept anonymous by means of a modified version of the Tor network, which sends Internet traffic through “virtual tunnels” that are extremely private. Moreover, at any given time WikiLeaks computers are feeding hundreds of thousands of fake submissions through these tunnels, obscuring the real documents. Assange told me that there are still vulnerabilities, but “this is vastly more secure than any banking network.”

Before launching the site, Assange needed to show potential contributors that it was viable. One of the WikiLeaks activists owned a server that was being used as a node for the Tor network. Millions of secret transmissions passed through it. The activist noticed that hackers from China were using the network to gather foreign governments’ information, and began to record this traffic. Only a small fraction has ever been posted on WikiLeaks, but the initial tranche served as the site’s foundation, and Assange was able to say, “We have received over one million documents from thirteen countries.”
-Julian Assange’s mission for total transparency

Related:
WikiLeaks on Twitter

Wikileaks and Iceland MPs propose 'journalism haven'

Wednesday, July 7, 2010

PFM in MENA- what's the value for money of 407 billion dollars

A new report from the World Bank "Public Financial Management Reform in the Middle East and North Africa: An Overview of Regional Experience" surveys the experience of the region on the topic of public financial management reform.

According to the most recent World Bank data, governments throughout the MENA region spent approximately $407 billion dollars in 2007 in delivering their policy, regulatory and service functions.

Related:
Executive Summary
Country Cases

PFM Efficiency gains in Egypt

one percent efficiency gain in Egypt’s budget for 2009 would yield $637 million dollars, enough resources to build 40,000 schools, pave 4,500 kilometers of highway, or recruit an additional 600,000 doctors.
- "Public Financial Management Reform in the Middle East and North Africa: An Overview of Regional Experience"