Archive for March, 2014

The Pronk Pops Show 235, March 31, 2014, Story 1: Federal Reserve Chair Janet Yellen Has No Exit Strategy — Expanding Credit With Near Zero Low Interest Rates and Quantitative Easing Forever — Financing Big Government Deficits Forever — Spending Addiction Disorder Enabled By Fed! — Fed is A Credit Drug Dealer For Banks and Governments — Videos

Posted on March 31, 2014. Filed under: Blogroll, Business, Climate Change, Communications, Computers, Culture | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 235: March 31, 2014

Pronk Pops Show 234: March 28, 2014

Pronk Pops Show 233: March 27, 2014

Pronk Pops Show 232: March 26, 2014

Pronk Pops Show 231: March 25, 2014

Pronk Pops Show 230: March 24, 2014

Pronk Pops Show 229: March 21, 2014

Pronk Pops Show 228: March 20, 2014

Pronk Pops Show 227: March 19, 2014

Pronk Pops Show 226: March 18, 2014

Pronk Pops Show 225: March 17, 2014

Pronk Pops Show 224: March 7, 2014

Pronk Pops Show 223: March 6, 2014

Pronk Pops Show 222: March 3, 2014

Pronk Pops Show 221: February 28, 2014

Pronk Pops Show 220: February 27, 2014

Pronk Pops Show 219: February 26, 2014

Pronk Pops Show 218: February 25, 2014

Pronk Pops Show 217: February 24, 2014

Pronk Pops Show 216: February 21, 2014

Pronk Pops Show 215: February 20, 2014

Pronk Pops Show 214: February 19, 2014

Pronk Pops Show 213: February 18, 2014

Pronk Pops Show 212: February 17, 2014

Pronk Pops Show 211: February 14, 2014

Pronk Pops Show 210: February 13, 2014

Pronk Pops Show 209: February 12, 2014

Pronk Pops Show 208: February 11, 2014

Pronk Pops Show 207: February 10, 2014

Pronk Pops Show 206: February 7, 2014

Pronk Pops Show 205: February 5, 2014

Pronk Pops Show 204: February 4, 2014

Pronk Pops Show 203: February 3, 2014

Pronk Pops Show 202: January 31, 2014

Pronk Pops Show 201: January 30, 2014

Pronk Pops Show 200: January 29, 2014

Pronk Pops Show 199: January 28, 2014

Pronk Pops Show 198: January 27, 2014

Pronk Pops Show 197: January 24, 2014

Pronk Pops Show 196: January 22, 2014

Pronk Pops Show 195: January 21, 2014

Pronk Pops Show 194: January 17, 2014

Pronk Pops Show 193: January 16, 2014

Pronk Pops Show 192: January 14, 2014

Pronk Pops Show 191: January 13, 2014

Pronk Pops Show 190: January 10, 2014

Pronk Pops Show 189: January 9, 2014

Pronk Pops Show 188: January 8, 2014

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Story 1: Federal Reserve Chair Janet Yellen Has No Exit Strategy  — Expanding Credit With Near Zero Low Interest Rates and Quantitative Easing Forever — Financing Big Government Deficits Forever — Spending Addiction Disorder Enabled By Fed! — Fed is A Credit Drug Dealer For Banks and Governments — Videos

inflation

countries

US-Consumer-Price-Index-Annual-August-2013

Consumer-price-index-gas-prices-inflation

ShadowStats_Inflation_slideshow

CPI-categories-plus-energy-since-2000

cpjji_componentscpi

3 Components of Inflation

fedbalsummary_balance_sheet

fed-funds-rate-mar2014

quantitative_easying

Yellen: Job Market is Weak, Strong Fed Policy Needed

 

Yellen Strongly Defends Easy Fed Policies, Cites Labor Slack

Stocks Higher on Dovish Yellen Commentary; Positive Q1 End

Ron Paul Yellen The Worst Fed Chair Yet To Come

Milton Friedman – Abolish The Fed

Special Report & Full Debate: 100 Years of Economic Turmoil: It’s Time to ‘End the Fed’!

 

Milton Friedman: The Purpose of the Federal Reserve

Milton Friedman on the Great Depression, Bank Runs & the Federal Reserve

 

Milton Friedman on Money / Monetary Policy (Federal Reserve) Part 1

Milton Friedman on Money / Monetary Policy (Federal Reserve) Part 2

Milton Friedman Interview with Dallas Fed President Richard W. Fisher

Should the GOVT help the POOR? – Milton Friedman

Highlights: John Taylor, November 2012 Milton Friedman Centennial Celebration

Taylor Says U.S. Needs `Sound’ Monetary, Fiscal Policies

NYU Stern Economics FRED Tutorial #3: Taylor Rule

FRED Economic Data

The FED Effect with Bill Still

Peter Schiff–Can You Trust Janet Yellen? 26.Mar.14

Stefan Molyneux on the Keiser Report The Federal Reserve is a Crime!

FEDERAL RESERVE CONSPIRACY – Murray Rothbard

“Why Was the Fed Created?” with George Selgin — Ron Paul Fed Lecture Series, Pt 1/3

 

History of the Federal Reserve (Money Masters)

“If America Doesn’t ABOLISH The FED, The FED Will ABOLISH AMERICA” | G. Edward Griffin

Yellen Says Extraordinary Support Needed for ‘Some Time’

By Jeff Kearns and Craig Torres

Federal Reserve Chair Janet Yellen, easing investor concern that interest rates may rise earlier than previously forecast, said the central bank’s unprecedented stimulus will be needed for “some time.”

Yellen, citing the examples of three people struggling to find work, used a speech to a community development conference in Chicago to make the case for continued Fed stimulus, which has included more than five years of interest rates near zero and trillions in bond purchases.

“This extraordinary commitment is still needed and will be for some time, and I believe that view is widely shared by my fellow policymakers at the Fed,” Yellen said. “The scars from the Great Recession remain, and reaching our goals will take time.”

Stocks rose as Yellen highlighted the Fed’s commitment to spur the economy and put 10.5 millionun employed Americans back to work. Share prices fell on March 19, when she said in a press conference that the Fed might start raising the benchmark interest rate above zero about six months after ending its bond purchase program. Yellen didn’t mention a timetable today.

“It is an indirect pushback,” said Ward McCarthy, chief financial economist at Jefferies LLC in New York. “I don’t think she could directly contradict what she said at the press conference, so she did the next best thing, which was to paint a picture of a Fed that is going to be accommodative for a long, long time.”

Stagnant Wages

Large numbers of partly unemployed workers, stagnant wages, lower labor-force participation andlonger periods of joblessness show that “there remains considerable slack in the economy and the labor market,” Yellen said.

The Standard & Poor’s 500 Index rose 0.6 percent to 1,868.55 at 11:38 a.m. in New York. The yield on the 10-year Treasury note was up two basis points, or 0.02 percentage point, to 2.74 percent.

The Federal Open Market Committee has kept the benchmark interest rate near zero since December 2008 and sought to cut borrowing costs and fuel growth through bond buying that has more than quadrupled its assets to $4.23 trillion.

While policy makers have slowed the pace of their monthly asset purchases over the past three gatherings to $55 billion from $85 billion, Yellen said the central bank’s “commitment is strong” to helping sustain progress in the job market.

“Recent steps by the Fed to reduce the rate of new securities purchases are not a lessening of this commitment, only a judgment that recent progress in the labor market means our aid for the recovery need not grow as quickly,” she said. “Earlier this month, the Fed reiterated its overall commitment to maintain extraordinary support for the recovery for some time to come.”

Human Cost

Yellen, 67, has focused on the labor market and the human cost of unemployment for much of her career as an academic and central bank official. After three years as Fed vice chair, she was sworn in last month to succeed Ben S. Bernanke.

The FOMC said in a policy statement this month that rates will likely remain low for a considerable time after the bond buying program ends. The committee said it will weigh a “wide range of information,” including labor-market measures, in deciding when it will eventually begin raising rates.

Unemployment was 6.7 percent in February, up from the 6.6 percent level in January that was the lowest since October 2008. The economy added 175,000 jobs in February, more than economists projected, following the weakest two-month hiring gain in more than a year in December and January.

Yellen departed from the style of her recent predecessors by citing three individuals by name and discussing in her speech how their struggles with joblessness “tell us important things that the unemployment rate alone cannot.” Yellen spoke to them by phone, Fed Spokeswoman Michelle Smith said.

Claims Processing

Yellen cited Dorine Poole, who lost a claims processing job and struggled to find work after two years of unemployment. She said Jermaine Brownlee, a plumber and construction worker, “scrambled for odd jobs and temporary work” and still makes less than before the recession. Vicki Lira lost two jobs, was homeless at times, and now serves food samples part-time at a grocery store.

“They are a reminder that there are real people behind the statistics, struggling to get by and eager for the opportunity to build better lives,” Yellen said. “Their experiences show some of the uniquely challenging and lasting effects of the Great Recession.”

 

QE, uncertainty and CPI
Commentary and weekly watch by Doug Noland

In last Wednesday’s press conference, Federal Reserve chair Janet Yellen upset the markets with her comment suggesting that the Fed might commence rate adjustments as early as six months after it concludes its latest quantitative easing program. Several officials have since tried to reassure market participants that the Fed has not moved forward its plans to raise rates. Even hawkish Fed officials went to pains to communicate that rate moves were not in the immediate offing.
Clearly, the Fed’s strategy is to do its utmost to reduce market uncertainty. The ratee-setting Federal Open Market Committee is moving forward methodically to wind down its balance sheet operations, while telegraphing an ultra-cautious rate policy (future, future little “baby steps”).

The Fed has good reason to worry about the markets and fret the issue of “uncertainty”. And it’s difficult to envisage a more transparent – and market-friendly – interest rate policy. And when the markets are in a good mood, it’s virtual nirvana. Financial markets – in particular stocks and corporate credit – can enjoy splendid market excess without concern that the Fed might choose to “lean against the wind” of destabilizing speculation. And for the Fed to actually get rates to what would be considered “slamming on the brakes” – harsh enough to puncture powerful market bubbles – well, that would be years away (more likely never).

Yet I would argue the notion that the Fed is capable of bridling market uncertainty is a bubble mirage. Our central bank has thus far been successful in keeping the markets focused on rate policies. Meanwhile, a great uncertainty furtively lurks: what will the end of Fed “money” printing mean for US and global markets, the emerging economies and the US and global economies more generally?

The entire QE issue/analysis is incredibly fascinating. Since September 2008, the Fed’s balance sheet has ballooned from about $900 billion to $4.227 trillion. If tapering runs its expected course, QE will end late this year with the Fed’s balance sheet near $4.5 trillion. This would leave the latest round of QE totaling almost $1.7 trillion, with the Fed’s balance sheet having expanded (a parabolic) 60% in two years. This would also place total Fed asset growth at $3.6 trillion, or 400%, in six years.

And why do I posit that the notion of the Fed harnessing uncertainty is a mirage? Because the Fed doesn’t have a clue as to the consequences of the $3.6 TN of liquidity it has pumped into the markets since 2008. And I don’t say this flippantly. Best I can tell, the Federal Reserve has not even attempted a comprehensive study of how this massive liquidity injection has flowed through the Treasury and MBS markets, U.S. financial markets more generally, global markets and financial systems, and economies at home and abroad. They have just remained determined to keep pumping it out there, supposedly to fight heightened deflationary forces. The Bernanke Fed had a theory.

In admittedly superficial analysis (from my perspective), I’ve in past analyses tried to differentiate the widely-divergent effects of QE1, QE2 and (“open-ended”) QE3. Past analysis tried to explain how QE1 was largely a shift of positions from leveraged players onto the Fed’s balance sheet. While this had a profound impact on sentiment, it didn’t really function as a direct injection of liquidity into the markets. QE2, on the other hand, was injected directly into a marketplace with a powerful propensity (“inflationary bias”) for purchasing/speculating in U.S. fixed income and the emerging markets. QE2 fueled “blow off” excesses, proving most destabilizing for EM markets and economies. QE3 has been an altogether different creature. With bond and EM Bubbles having already begun to falter, the Fed’s (along with the BOJ’s) liquidity onslaught predominantly spurred speculative “blow off” dynamics in U.S. equities and corporate debt.

When addressing QE effects, Fed speakers (and papers) focus on basis point declines in Treasury and MBS yields, along with adjustments in the structure of term premiums (the yield curve). Dr. Bernanke’s theories held that Fed “money” printing could ensure a rising rate of inflation (i.e. central banks could inflate away problematic debt loads). Now, as the biggest QE yet begins to wind down, most notions of how Fed “money” printing operations actually function are (over)due for a thorough reexamination. After all, in the face of what will be $1.6 TN of new liquidity, bond yields rose and CPI declined. Stocks, on the other hand, went on a historic moonshot. In corporate Credit, it became 2007 reincarnate.

When the Fed was discussing its so-called “exit strategy” back in 2011, I was writing there would be “No Exit.” Well, the Fed has since doubled the size of its balance sheet. And I just don’t see how the Fed can inflate liquidity from $900bn to $4.5 TN and then just shut down the “printing presses” – that is, without some major consequences for the general liquidity backdrop. The history of monetary inflations provides unequivocal support for this view.

Conventional thinking, well, it simply could not see things more differently. Most believe that QE has had minimal effect, so ending the program will be inconsequential. The bulls (these days that means just about everybody) believe stock prices have been driven higher by robust earnings. The economic recovery has seen a superior economic structure generate outsized corporate profits. The economy drives the markets – and not vice versa. From this viewpoint, QE is for the most part insignificant.

The commonly held view of limited QE impact is driven by another momentous “flow of funds” misperception. Even top Federal Reserve officials these days believe that QE has thus far exerted minimal impact because Fed “liquidity” has been sitting inertly as “reserves” on the banking system balance sheet. I say “another” misperception, because I am constantly reminded of how the profound market impacts of Fannie, Freddie and the FHLB went unrecognized for years (especially 1994-2004) during a protracted Bubble period. The view then was that “only banks create money and Credit.” Somehow, a historic inflation in GSE Credit unfolded with barely a notice from Wall Street analysts or the Fed. The view today is that there is little impact from the Fed’s balance sheet so long as QE is held as “reserves” by the banks.

There is definitely confusion on the issue of “flow” versus “level” analysis. In QE operations, the Fed “Credits” accounts with new purchasing power as it consummates purchases of Treasury and MBS securities in the marketplace. Essentially, the Fed creates new electronic liabilities (“IOUs”) that provide immediate liquidity/purchasing power (“money”) to the seller of securities. Importantly, these liabilities will exist until the Fed liquidates securities and uses the proceeds to pay down its IOUs. To be sure, Fed operations dictate the “level” of its liabilities. Moreover, these liabilities by design are held by financial institutions that have a clearing relationship with the Fed, largely U.S.-operated financial institutions.

At a point in time, the “level” of “reserves” liabilities created by the Fed will be held as banking system assets (it’s just “accounting”). But this basically tells us nothing in regard to the transactions that took place between the Fed’s purchase and the eventual deposit of this liquidity into the banking system. Moreover, the “level” of “reserves” informs us nothing about the “flows” – flows that could be in the hundreds of billions or more on an intra-day basis (who knows?). And it is these transactional “flows” that have profound impacts on market dynamics and pricing.

From my perspective, it’s all rather obvious that the greatest QE3 impact has been the stoking of Bubbles in U.S. equities and corporate Credit. I’ve used the example of the Fed purchasing Treasuries and MBS from a rather large “bond” fund suffering redemptions. In this case, Fed liquidity would then be used to fund bond investor outflows that find their way to, say, a major U.S. equities ETF. The ETF then uses this liquidity to buys stocks, providing the sellers the liquidity to buy other securities (or things). Another example would have Fed liquidity accommodating a rotation of hedge fund positions from bonds to equities. In this example, a hedge fund might sell a (underperforming) 10-year Treasury note to purchase an outperforming Facebook stock. And if the seller is Mark Zuckerberg, a chunk of his sales proceeds will boost California and federal income tax receipts (quickly spent by both governments). Zuckerberg’s employees can use stock sale proceeds to buy homes and luxury automobiles (and planes!). And Zuckerberg can use booming Facebook stock as currency to buy companies in a hotly contested industry acquisition boom.

And with 2013/early-2014 too reminiscent of Nasdaq 1999, one should not understate the role QE3 has played in stoking another historic Bubble and “arms race” throughout the broadly-defined “technology” sector. The mad dash for hits, clicks, likes, advertising dollars and revenues throughout “social media,” the “cloud,” 3D printing, solar, etc. even surpasses 1999 – whether the bulls are willing to admit as much or not. At this point, it’s a full-fledged mania (again).

It’s ironic – and I believe really important. The Bernanke Doctrine holds that the Fed’s printing press can basically guarantee a rising general price level. Meanwhile, QE1-3 liquidity has ensured that only more and bigger companies from Silicon Valley to China to “Hollywood” provide a virtually limitless supply of smartphones, computers, tablets and electronic gadgets, along with a plethora of downloadable content and services. Throughout the markets and the real economy, it’s all leading to unusual price instabilities (which the Fed is expected to counter – of course, with only more QE).

As much as it is reminiscent of the late-nineties, the more apt comparison is to the Roaring Twenties. Major technological innovation throughout the 1920’s had unappreciated consequences for the economic structure and price dynamics more generally. Misunderstanding the forces behind the downward pressure on many prices, the Federal Reserve remained too highly accommodative for too long. In the process, the Fed harbored a prolonged period of deep economic maladjustment, while fostering a historic speculative financial Bubble.

From my reading of history, central banks must be especially diligent with respect to monetary stability (“money” and Credit) during periods of profound technological and financial innovation. Repeating mistakes from the Twenties, the Fed and global central bankers have again done the exact opposite (for a long time now).

From my perspective, the downward pressure on the general consumer price level has been exacerbated by QE3. But this is foremost a “supply” issue as opposed to “deflation.” And as much as the Fed speaks of its 2% inflation “mandate” – and as much as the markets assume this mandate will eventually justify QE4 – low inflation should be recognized at this point as predominantly a global issue. The Fed and its now grossly bloated balance sheet do not – and will not – control CPI.
Doug Noland is a market strategist for the Prudent Bear Funds.

http://www.atimes.com/atimes/Global_Economy/GECON-01-310314.html

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or DownloadShow 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 234, March 28, 2014, Story 1: President Obama’s Trust Gap Widens — The Unbelievable President Loses Support of American People and World Leaders — The Decline and Fall of President Obama With The Big Lies — Lame Duck — Videos

Posted on March 28, 2014. Filed under: American History, Blogroll, Communications, Constitutional Law, Economics, Education, Employment, Federal Government, Government, History, Law, Philosophy, Photos, Politics, Radio, Regulation, Religion, Security, Success, Taxes, Technology, Videos, Violence, War, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 234: March 28, 2014

Pronk Pops Show 233: March 27, 2014

Pronk Pops Show 232: March 26, 2014

Pronk Pops Show 231: March 25, 2014

Pronk Pops Show 230: March 24, 2014

Pronk Pops Show 229: March 21, 2014

Pronk Pops Show 228: March 20, 2014

Pronk Pops Show 227: March 19, 2014

Pronk Pops Show 226: March 18, 2014

Pronk Pops Show 225: March 17, 2014

Pronk Pops Show 224: March 7, 2014

Pronk Pops Show 223: March 6, 2014

Pronk Pops Show 222: March 3, 2014

Pronk Pops Show 221: February 28, 2014

Pronk Pops Show 220: February 27, 2014

Pronk Pops Show 219: February 26, 2014

Pronk Pops Show 218: February 25, 2014

Pronk Pops Show 217: February 24, 2014

Pronk Pops Show 216: February 21, 2014

Pronk Pops Show 215: February 20, 2014

Pronk Pops Show 214: February 19, 2014

Pronk Pops Show 213: February 18, 2014

Pronk Pops Show 212: February 17, 2014

Pronk Pops Show 211: February 14, 2014

Pronk Pops Show 210: February 13, 2014

Pronk Pops Show 209: February 12, 2014

Pronk Pops Show 208: February 11, 2014

Pronk Pops Show 207: February 10, 2014

Pronk Pops Show 206: February 7, 2014

Pronk Pops Show 205: February 5, 2014

Pronk Pops Show 204: February 4, 2014

Pronk Pops Show 203: February 3, 2014

Pronk Pops Show 202: January 31, 2014

Pronk Pops Show 201: January 30, 2014

Pronk Pops Show 200: January 29, 2014

Pronk Pops Show 199: January 28, 2014

Pronk Pops Show 198: January 27, 2014

Pronk Pops Show 197: January 24, 2014

Pronk Pops Show 196: January 22, 2014

Pronk Pops Show 195: January 21, 2014

Pronk Pops Show 194: January 17, 2014

Pronk Pops Show 193: January 16, 2014

Pronk Pops Show 192: January 14, 2014

Pronk Pops Show 191: January 13, 2014

Pronk Pops Show 190: January 10, 2014

Pronk Pops Show 189: January 9, 2014

Pronk Pops Show 188: January 8, 2014

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Story 1: President Obama’s Trust Gap Widens — The Unbelievable President Loses Support of American People and World Leaders — The Decline and Fall of President Obama — Lame Duck — Videos

motuslame duck dynasty

gop_duckobamacareironylameprivacy_IRSI_amA_not_dick_cheney

obama-pinocchio-president-political-cartoon-art-comic

Judge Pirro Calls Out Obama – The Man CANNOT be Trusted!!!

Obama Condemns IRS Scandal ‘I Have Got No Patience’ For It

 

White House Woes! Poll Most Americans Losing Trust In Obama Admin Megyn Kelly

Losing Faith In The Feds Obama Admin Scandals Erode Americans’ Trust In Government On The Record

New Signs Obama Is Losing Public Trust Over IRS Scandal Cavuto

Rand Paul: ‘Constellation Of Scandals’ Means Obama Is Losing ‘Moral Authority To Lead The Nation’

 

Obama Admin Can Not Be Trusted!! Says Frm Head of Homeland Security Wake Up America!

Nate Silver Predicts GOP Has 60% Shot at Retaking Senate

IRS Scandal House GOP Demands Faster Turnover Of IRS Documents Cavuto

DOJ Rejects Sen Ted Cruz’s Request For Special Prosecutor In IRS Scandal – Cavuto

IRS Speech Police? – IRS Proposes New Limits On Political Activity – IRS Scandal – On The Record

Rep. Gowdy Questions IRS Commissioner John Koskinen about IRS Targeting Scandal

John Stossel on IRS Scandal You Can t Fix Gove..

Glenn Beck Exposes Obama’s Fraudulent History and Radicalized Beliefs

The Big Lie – American Anti-Nazi & Anti-Communist Propaganda Film | 1951 | Full Length Documentary

Obamacare Fumbles, lies and deceit

President Obama Lies Compilation [2008 – 2014] WAKE UP!

65 Outrageous Lies by President Obama

Obama Trust Us To Spy On You

Obama-We’re the Most Transparent and Ethical Administration in U.S. History!

Obama’s Big Lie: Do Calls for Fiscal Responsibility Mask a Sinister Agenda?

TRUST Your GOVERNMENT ? What The PEOPLE On The Street Think. AMERICA & OBAMA

Mediaite’s Joe Concha: Obamacare Debacle Marks ‘End’ of Obama Presidency, ‘Lame Duck Status’

Obama In Trouble! Is He Now A Lame Duck

CrossTalk: Lame Duck Obama

Is Obama Already A Lame Duck President?

BBC News Syria vote could leave Obama ‘lame duck president’

The Case for Impeaching Barack Obama (Part 1)

The Case for Impeaching Barack Obama (Part 2)

 

All False statements involving Barack Obama

Mistrust overshadows Obama’s Saudi trip

US President Barack Obama meets Saudi King Abdullah Friday as mistrust fuelled by differences over Iran and Syria overshadows a decades-long alliance between their countries.

Obama, who is due to arrive in Saudi Arabia late in the afternoon on a flight from Italy, is expected to hold evening talks with the monarch on a royal estate outside Riyadh.

Saudi Arabia has strong reservations about efforts by Washington and other major world powers to negotiate a deal with Iran on its nuclear programme.

It is also disappointed over Obama’s 11th-hour decision last year not to take military action against the Syrian regime over chemical weapons attacks.

Saudi analyst Abdel Aziz al-Sagr, who heads the Gulf Research Centre, said Saudi-US relations are “tense due to Washington’s stances” on the Middle East, especially Iran.

The recent rapprochement between Tehran and Washington “must not take place at the expense of relations with Riyadh,” Sagr told AFP.

Sunni Muslim Saudi Arabia, long wary of Shiite Iran’s regional ambitions, views a November deal between world powers and Iran over the latter’s nuclear programme as a risky venture that could embolden Tehran.

The interim agreement curbs Iran’s controversial nuclear activities in exchange for limited sanctions relief, and is aimed at buying time to negotiate a comprehensive accord.

But Sagr said “arming the Syrian opposition will top the agenda” during Obama’s visit, his second since his election in 2009.

Analyst Khaled al-Dakhil spoke of “major differences” with Washington, adding that Obama will focus on easing “Saudi fears on Iran and on regional security.”

Saudi Arabia, the largest power in the six-nation Gulf Cooperation Council, fears that a possible US withdrawal from the Middle East and a diplomatic overture towards Iran would further feed Tehran’s regional ambitions.

Iranian-Saudi rivalry crystallised with the Syrian conflict: Tehran backs President Bashar al-Assad’s regime, while several GCC states support the rebellion against him.

– ‘Clearing the air’ –

Obama’s stances towards events reshaping the region “have strained (Saudi-US) relations but without causing a complete break,” said Anwar Eshki, head of the Jeddah-based Middle East Centre for Strategic and Legal Studies.

US security and energy specialist professor Paul Sullivan said Obama meeting King Abdullah could “help clear the air on some misunderstandings.”

“However, I would be quite surprised if there were any major policy changes during this visit. This is also partly a reassurance visit,” he added.

White House spokesman Jay Carney has said that “whatever differences we may have do not alter the fact that this is a very important and close partnership”.

However, Riyadh seems to be reaching out more towards Asia, including China, in an apparent bid to rebalance its international relations.

Crown Prince Salman bin Abdulaziz visited China, Pakistan, Japan and India this month, reportedly to strengthen ties.

The US-Saudi relationship dates to the end of World War II and was founded on an agreement for Washington to defend the Gulf state in exchange for oil contracts.

OPEC kingpin Saudi Arabia is the world’s top producer and exporter of oil.

Obama and the king are also expected to discuss deadlocked US-brokered Israeli-Palestinian peace talks.

They will also discuss Egypt, another bone of contention since the 2011 uprising that ousted Hosni Mubarak, who was a staunch US and Saudi ally.

The kingdom was dismayed by the partial freezing of US aid to Egypt after the army toppled Islamist president Mohamed Morsi last July — a move hailed by Riyadh.

On Thursday, Egypt’s Field Marshal Abdel Fattah al-Sisi resigned as defence minister after announcing he would stand for president.

Meanwhile, dozens of US lawmakers have urged Obama in a letter to publicly address Saudi Arabia’s “systematic human rights violations,” including efforts by women activists to challenge its ban on female drivers.

And rights group Amnesty International said Obama “must break the US administration’s silence on Saudi Arabia’s human rights record by taking a strong public stand against the systematic violations in the kingdom.”

“It is crucial that President Obama sends a strong message to the government of Saudi Arabia that its gross human rights violations and systematic discrimination are unacceptable,” said Hassiba Hadj Sahraoui, Amnesty’s deputy director for the Middle East and North Africa.

“A failure to do so would undermine the human rights principles the USA purports to stand for,” she added in a statement.

Amnesty also urged Obama to express “dismay” at the kingdom’s ban on women driving as his visit coincides with a local campaign to end the globally unique ban.

http://news.yahoo.com/mistrust-overshadows-obamas-saudi-trip-055623617.html

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 222-234

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or DownloadShow 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 233, March 27, 2014, Story 1: NSA Metadata To Be Held By Telephone Companies — Great Distraction — Still Collecting and Intercepting All Americans Telephone Calls and All Information Transmitted Over The Internet and Telephone Exchanges — Stop Deceiving The American People Mr. President — Videos

Posted on March 27, 2014. Filed under: Applications, Blogroll, College, Communications, Computers, Constitutional Law, Crime, Economics, Education, Federal Government, Government, Government Spending, Hardware, Law, Media, Philosophy, Photos, Politics, Radio, Regulation, Resources, Security, Software, Taxes, Technology, Terror, Terrorism, Violence, War, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 233: March 27, 2014

Pronk Pops Show 232: March 26, 2014

Pronk Pops Show 231: March 25, 2014

Pronk Pops Show 230: March 24, 2014

Pronk Pops Show 229: March 21, 2014

Pronk Pops Show 228: March 20, 2014

Pronk Pops Show 227: March 19, 2014

Pronk Pops Show 226: March 18, 2014

Pronk Pops Show 225: March 17, 2014

Pronk Pops Show 224: March 7, 2014

Pronk Pops Show 223: March 6, 2014

Pronk Pops Show 222: March 3, 2014

Pronk Pops Show 221: February 28, 2014

Pronk Pops Show 220: February 27, 2014

Pronk Pops Show 219: February 26, 2014

Pronk Pops Show 218: February 25, 2014

Pronk Pops Show 217: February 24, 2014

Pronk Pops Show 216: February 21, 2014

Pronk Pops Show 215: February 20, 2014

Pronk Pops Show 214: February 19, 2014

Pronk Pops Show 213: February 18, 2014

Pronk Pops Show 212: February 17, 2014

Pronk Pops Show 211: February 14, 2014

Pronk Pops Show 210: February 13, 2014

Pronk Pops Show 209: February 12, 2014

Pronk Pops Show 208: February 11, 2014

Pronk Pops Show 207: February 10, 2014

Pronk Pops Show 206: February 7, 2014

Pronk Pops Show 205: February 5, 2014

Pronk Pops Show 204: February 4, 2014

Pronk Pops Show 203: February 3, 2014

Pronk Pops Show 202: January 31, 2014

Pronk Pops Show 201: January 30, 2014

Pronk Pops Show 200: January 29, 2014

Pronk Pops Show 199: January 28, 2014

Pronk Pops Show 198: January 27, 2014

Pronk Pops Show 197: January 24, 2014

Pronk Pops Show 196: January 22, 2014

Pronk Pops Show 195: January 21, 2014

Pronk Pops Show 194: January 17, 2014

Pronk Pops Show 193: January 16, 2014

Pronk Pops Show 192: January 14, 2014

Pronk Pops Show 191: January 13, 2014

Pronk Pops Show 190: January 10, 2014

Pronk Pops Show 189: January 9, 2014

Pronk Pops Show 188: January 8, 2014

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Story 1: NSA Metadata To Be Held By Telephone Companies — Great Distraction — Still Collecting and Intercepting All Americans Telephone Calls and All Information Transmitted Over The Internet and Telephone Exchanges — Stop Deceiving The American People Mr. President — Videos

Obama: NSA Proposal Satisfies Public Concerns

 

Obama announces overhaul of NSA metadata collection

NSA – Changes To Metadata Program – Special Report All Star

President Obama Names Michael Rogers As New Head Of The NSA

Background Articles and Videos

nsa_logo

flowchart_final_008acronyms_003130607_PRISM_ppt_1.jpg.CROP.original-original

prism-slide-2

nsa-prism-slide

prism_vendor_slide

prism-slide-6

top-secret-nsa-prism-slide-7

prism-slide-8

top-secret-nsa-prism-slide-9

xkeyscore_cover_slide

x-keyscore

keystore_slidexkeyscore_slide

NSA-X-Keyscore-slide-003

Screen-Shot

xkeyscore_slideNSA-X-Keyscore-slide-004

XKS_Future_Slide

xkeyscore_plugins

screen-shot-2013-07-31-at-8-01-30-pm

screen-shot-2013-07-31-at-8-03-13-pm

data-mining-and-terrorists-apprehended

xks_map

Through a PRISM, Darkly – Everything we know about NSA spying [30c3]

Published on Dec 30, 2013

Through a PRISM, Darkly
Everything we know about NSA spying

From Stellar Wind to PRISM, Boundless Informant to EvilOlive, the NSA spying programs are shrouded in secrecy and rubber-stamped by secret opinions from a court that meets in a faraday cage. The Electronic Frontier Foundation’s Kurt Opsahl explains the known facts about how the programs operate and the laws and regulations the U.S. government asserts allows the NSA to spy on you.
The Electronic Frontier Foundation, a non-profit civil society organization, has been litigating against the NSA spying program for the better part of a decade. EFF has collected and reviewed dozens of documents, from the original NY Times stories in 2005 and the first AT&T whistleblower in 2006, through the latest documents released in the Guardian or obtained through EFF’s Freedom of Information (government transparency) litigation. EFF attorney Kurt Opsahl’s lecture will describe how the NSA spying program works, the underlying technologies, the targeting procedures (how they decide who to focus on), the minimization procedures (how they decide which information to discard), and help you makes sense of the many code names and acronyms in the news. He will also discuss the legal and policy ramifications that have become part of the public debate following the recent disclosures, and what you can do about it. After summarizing the programs, technologies, and legal/policy framework in the lecture, the audience can ask questions.

Speaker: Kurt Opsahl
EventID: 5255
Event: 30th Chaos Communication Congress [30c3] by the Chaos Computer Club [CCC]
Location: Congress Centrum Hamburg (CCH); Am Dammtor; Marseiller Straße; 20355 Hamburg; Germany
Language: english

Glenn Becks “SURVEILLANCE STATE”

Inside the NSA

Ed Snowden, NSA, and Fairy Tales

AT&T Spying On Internet Traffic

For years the National Securities Agency, has been spying on each & every keystroke. The national headquarters of AT&T is in Missouri, where ex-employees describe a secret room. The program is called “Splitter Cut-In & Test Procedure.”

NSA Whistle-Blower Tells All – Op-Docs: The Program

The filmmaker Laura Poitras profiles William Binney, a 32-year veteran of the National Security Agency who helped design a top-secret program he says is broadly collecting Americans’ personal data.

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

He told you so: Bill Binney talks NSA leaks

William Benny – The Government is Profiling You (The NSA is Spying on You)

‘After 9/11 NSA had secret deal with White House’

The story of Whistleblower Thomas Drake

Whistleblowers, Part Two: Thomas Drake

NSA Whistleblower Thomas Drake speaks at National Press Club – March 15, 2013

Meet Edward Snowden: NSA PRISM Whistleblower

The Truth About Edward Snowden

N.S.A. Spying: Why Does It Matter?

Inside The NSA~Americas Cyber Secrets

NSA Whistleblower Exposes Obama’s Dragnet

AT&T whistleblower against immunity for Bush spy program-1/2

AT&T Whistleblower Urges Against Immunity for Telecoms in Bush Spy Program

The Senate is expected to vote on a controversial measure to amend the Foreign Intelligence Surveillance Act tomorrow. The legislation would rewrite the nation’s surveillance laws and authorize the National Security Agency’s secret program of warrantless wiretapping. We speak with Mark Klein, a technician with AT&T for over twenty-two years. In 2006 Klein leaked internal AT&T documents that revealed the company had set up a secret room in its San Francisco office to give the National Security Agency access to its fiber optic internet cables.

AT&T whistleblower against immunity for Bush spy program-2/2

Enemy Of The State 1998 (1080p) (Full movie)

Background Articles and Videos

Stellar Wind

Stellar Wind was the open secret code name for four surveillance programs by the United States National Security Agency (NSA) during the presidency of George W. Bush and revealed by Thomas Tamm to The New York Times reporters James Risen and Eric Lichtblau.[1] The operation was approved by President George W. Bush shortly after the September 11 attacks in 2001.[2] Stellar Wind was succeeded during the presidency of Barack Obama by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications.[3]

The program’s activities involved data mining of a large database of the communications of American citizens, including e-mail communications, phone conversations, financial transactions, and Internet activity.[1] William Binney, a retired Technical Leader with the NSA, discussed some of the architectural and operational elements of the program at the 2012 Chaos Communication Congress.[4]

There were internal disputes within the Justice Department about the legality of the program, because data are collected for large numbers of people, not just the subjects of Foreign Intelligence Surveillance Act (FISA) warrants.[4]

During the Bush Administration, the Stellar Wind cases were referred to by FBI agents as “pizza cases” because many seemingly suspicious cases turned out to be food takeout orders. According to Mueller, approximately 99 percent of the cases led nowhere, but “it’s that other 1% that we’ve got to be concerned about”.[2] One of the known uses of these data were the creation of suspicious activity reports, or “SARS”, about people suspected of terrorist activities. It was one of these reports that revealed former New York governor Eliot Spitzer’s use of prostitutes, even though he was not suspected of terrorist activities.[1]

In March 2012 Wired magazine published “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)” talking about a vast new NSA facility in Utah and says “For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail,” naming the official William Binney, a former NSA code breaker. Binney went on to say that the NSA had highly secured rooms that tap into major switches, and satellite communications at both AT&T and Verizon.[5] The article suggested that the otherwise dispatched Stellar Wind is actually an active program.

http://en.wikipedia.org/wiki/Stellar_Wind_%28code_name%29

PRISM

PRISM is a clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) since 2007.[1][2][3][Notes 1] PRISM is a government codename for a data collection effort known officially as US-984XN.[8][9] It is operated under the supervision of the United States Foreign Intelligence Surveillance Court pursuant to the Foreign Intelligence Surveillance Act (FISA).[10] The existence of the program was leaked by NSA contractor Edward Snowden and published by The Guardian and The Washington Post on June 6, 2013.

A document included in the leak indicated that the PRISM SIGAD was “the number one source of raw intelligence used for NSA analytic reports.”[11] The President’s Daily Brief, an all-source intelligence product, cited PRISM data as a source in 1,477 items in 2012.[12] The leaked information came to light one day after the revelation that the United States Foreign Intelligence Surveillance Court had been requiring the telecommunications company Verizon to turn over to the NSA logs tracking all of its customers’ telephone calls on an ongoing daily basis.[13][14]

According to the Director of National Intelligence James Clapper, PRISM cannot be used to intentionally target any Americans or anyone in the United States. Clapper said a special court, Congress, and the executive branch oversee the program and extensive procedures ensure the acquisition, retention, and dissemination of data accidentally collected about Americans is kept to a minimum.[15] Clapper issued a statement and “fact sheet”[16] to correct what he characterized as “significant misimpressions” in articles by The Washington Post and The Guardian newspapers.[17]

History

Slide showing that much of the world’s communications flow through the US

Details of information collected via PRISM

PRISM is a “Special Source Operation” in the tradition of NSA’s intelligence alliances with as many as 100 trusted U.S. companies since the 1970s.[1] A prior program, the Terrorist Surveillance Program, was implemented in the wake of the September 11 attacks under the George W. Bush Administration but was widely criticized and had its legality questioned, because it was conducted without approval of the Foreign Intelligence Surveillance Court (FISC).[18][19][20][21] PRISM was authorized by an order of the FISC.[11] Its creation was enabled by the Protect America Act of 2007 under President Bush and the FISA Amendments Act of 2008, which legally immunized private companies that cooperated voluntarily with US intelligence collection and was renewed by Congress under President Obama in 2012 for five years until December 2017.[2][22] According to The Register, the FISA Amendments Act of 2008 “specifically authorizes intelligence agencies to monitor the phone, email, and other communications of U.S. citizens for up to a week without obtaining a warrant” when one of the parties is outside the U.S.[22]

PRISM was first publicly revealed on June 6, 2013, after classified documents about the program were leaked to The Washington Post and The Guardian by American Edward Snowden.[2][1] The leaked documents included 41 PowerPoint slides, four of which were published in news articles.[1][2] The documents identified several technology companies as participants in the PRISM program, including (date of joining PRISM in parentheses) Microsoft (2007), Yahoo! (2008), Google (2009), Facebook (2009), Paltalk (2009), YouTube (2010), AOL (2011), Skype (2011), and Apple (2012).[23] The speaker’s notes in the briefing document reviewed by The Washington Post indicated that “98 percent of PRISM production is based on Yahoo, Google and Microsoft.”[1]

The slide presentation stated that much of the world’s electronic communications pass through the United States, because electronic communications data tend to follow the least expensive route rather than the most physically direct route, and the bulk of the world’s internet infrastructure is based in the United States.[11] The presentation noted that these facts provide United States intelligence analysts with opportunities for intercepting the communications of foreign targets as their electronic data pass into or through the United States.[2][11]

According to The Washington Post, the intelligence analysts search PRISM data using terms intended to identify suspicious communications of targets whom the analysts suspect with at least 51 percent confidence to not be United States citizens, but in the process, communication data of some United States citizens are also collected unintentionally.[1] Training materials for analysts tell them that while they should periodically report such accidental collection of non-foreign United States data, “it’s nothing to worry about.”[1]

Response from companies

The original Washington Post and Guardian articles reporting on PRISM noted that one of the leaked briefing documents said PRISM involves collection of data “directly from the servers” of several major internet services providers.[2][1]

Initial Public Statements

Corporate executives of several companies identified in the leaked documents told The Guardian that they had no knowledge of the PRISM program in particular and also denied making information available to the government on the scale alleged by news reports.[2][24] Statements of several of the companies named in the leaked documents were reported by TechCrunch and The Washington Post as follows:[25][26]

Slide listing companies and the date that PRISM collection began

  • Microsoft: “We provide customer data only when we receive a legally binding order or subpoena to do so, and never on a voluntary basis. In addition we only ever comply with orders for requests about specific accounts or identifiers. If the government has a broader voluntary national security program to gather customer data we don’t participate in it.”[25]
  • Yahoo!: “Yahoo! takes users’ privacy very seriously. We do not provide the government with direct access to our servers, systems, or network.”[25] “Of the hundreds of millions of users we serve, an infinitesimal percentage will ever be the subject of a government data collection directive.”[26]
  • Facebook: “We do not provide any government organization with direct access to Facebook servers. When Facebook is asked for data or information about specific individuals, we carefully scrutinize any such request for compliance with all applicable laws, and provide information only to the extent required by law.”[25]
  • Google: “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a backdoor for the government to access private user data.”[25] “[A]ny suggestion that Google is disclosing information about our users’ Internet activity on such a scale is completely false.”[26]
  • Apple: “We have never heard of PRISM. We do not provide any government agency with direct access to our servers, and any government agency requesting customer data must get a court order.”[27]
  • Dropbox: “We’ve seen reports that Dropbox might be asked to participate in a government program called PRISM. We are not part of any such program and remain committed to protecting our users’ privacy.”[25]

In response to the technology companies’ denials of the NSA being able to directly access the companies’ servers, The New York Times reported that sources had stated the NSA was gathering the surveillance data from the companies using other technical means in response to court orders for specific sets of data.[13] The Washington Post suggested, “It is possible that the conflict between the PRISM slides and the company spokesmen is the result of imprecision on the part of the NSA author. In another classified report obtained by The Post, the arrangement is described as allowing ‘collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,’ rather than directly to company servers.”[1] “[I]n context, ‘direct’ is more likely to mean that the NSA is receiving data sent to them deliberately by the tech companies, as opposed to intercepting communications as they’re transmitted to some other destination.[26]

“If these companies received an order under the FISA amendments act, they are forbidden by law from disclosing having received the order and disclosing any information about the order at all,” Mark Rumold, staff attorney at the Electronic Frontier Foundation, told ABC News.[28]

Slide showing two different sources of NSA data collection. The first source the fiber optic cables of the internet handled by the Upstream program and the second source the servers of major internet companies handled by PRISM.[29]

On May 28, 2013, Google was ordered by United States District Court Judge Susan Illston to comply with a National Security Letter issued by the FBI to provide user data without a warrant.[30] Kurt Opsahl, a senior staff attorney at the Electronic Frontier Foundation, in an interview with VentureBeat said, “I certainly appreciate that Google put out a transparency report, but it appears that the transparency didn’t include this. I wouldn’t be surprised if they were subject to a gag order.”[31]

The New York Times reported on June 7, 2013, that “Twitter declined to make it easier for the government. But other companies were more compliant, according to people briefed on the negotiations.”[32] The other companies held discussions with national security personnel on how to make data available more efficiently and securely.[32] In some cases, these companies made modifications to their systems in support of the intelligence collection effort.[32] The dialogues have continued in recent months, as General Martin Dempsey, the chairman of the Joint Chiefs of Staff, has met with executives including those at Facebook, Microsoft, Google and Intel.[32] These details on the discussions provide insight into the disparity between initial descriptions of the government program including a training slide which states “Collection directly from the servers”[29] and the companies’ denials.[32]

While providing data in response to a legitimate FISA request approved by FISC is a legal requirement, modifying systems to make it easier for the government to collect the data is not. This is why Twitter could legally decline to provide an enhanced mechanism for data transmission.[32] Other than Twitter, the companies were effectively asked to construct a locked mailbox and provide the key to the government, people briefed on the negotiations said.[32] Facebook, for instance, built such a system for requesting and sharing the information.[32] Google does not provide a lockbox system, but instead transmits required data by hand delivery or secure FTP.[33]

Post-PRISM Transparency Reports

In response to the publicity surrounding media reports of data-sharing, several companies requested permission to reveal more public information about the nature and scope of information provided in response to National Security requests.

On June 14, 2013, Facebook reported that the U.S. Government had authorized the communication of “about these numbers in aggregate, and as a range.” In a press release posted to their web site, Facebook reported, “For the six months ending December 31, 2012, the total number of user-data requests Facebook received from any and all government entities in the U.S. (including local, state, and federal, and including criminal and national security-related requests) – was between 9,000 and 10,000.” Facebook further reported that the requests impacted “between 18,000 and 19,000” user accounts, a “tiny fraction of one percent” of more than 1.1 billion active user accounts.[34]

Microsoft reported that for the same period, it received “between 6,000 and 7,000 criminal and national security warrants, subpoenas and orders affecting between 31,000 and 32,000 consumer accounts from U.S. governmental entities (including local, state and federal)” which impacted “a tiny fraction of Microsoft’s global customer base”.[35]

Google issued a statement criticizing the requirement that data be reported in aggregated form, stating that lumping national security requests with criminal request data would be “a step backwards” from its previous, more detailed practices on its site transparency report. The company said that it would continue to seek government permission to publish the number and extent of FISA requests.[36]

Response from United States government

Executive branch

Shortly after publication of the reports by The Guardian and The Washington Post, the United States Director of National Intelligence, James Clapper, on June 7 released a statement confirming that for nearly six years the government of the United States had been using large internet services companies such as Google and Facebook to collect information on foreigners outside the United States as a defense against national security threats.[13] The statement read in part, “The Guardian and The Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act. They contain numerous inaccuracies.”[37] He went on to say, “Section 702 is a provision of FISA that is designed to facilitate the acquisition of foreign intelligence information concerning non-U.S. persons located outside the United States. It cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States.”[37] Clapper concluded his statement by stating “The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.”[37] On March 12, 2013, Clapper had told the United States Senate Select Committee on Intelligence that the NSA does “not wittingly” collect any type of data on millions or hundreds of millions of Americans.[38] In an NBC News interview, Clapper said he answered Senator Wyden’s question in the “least untruthful manner by saying no”.[39]

Clapper also stated that “the NSA collects the phone data in broad swaths, because collecting it (in) a narrow fashion would make it harder to identify terrorism-related communications. The information collected lets the government, over time, make connections about terrorist activities. The program doesn’t let the U.S. listen to people’s calls, but only includes information like call length and telephone numbers dialed.”[15]

On June 8, 2013, Clapper said “the surveillance activities published in The Guardian and The Washington Post are lawful and conducted under authorities widely known and discussed, and fully debated and authorized by Congress.”[40][10] The fact sheet described PRISM as “an internal government computer system used to facilitate the government’s statutorily authorized collection of foreign intelligence information from electronic communication service providers under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).”[10]

The National Intelligence fact sheet further stated that “the United States Government does not unilaterally obtain information from the servers of U.S. electronic communication service providers. All such information is obtained with FISA Court approval and with the knowledge of the provider based upon a written directive from the Attorney General and the Director of National Intelligence.” It said that the Attorney General provides FISA Court rulings and semi-annual reports about PRISM activities to Congress, “provid[ing] an unprecedented degree of accountability and transparency.”[10]

The President of the United States, Barack Obama, said on June 7 “What you’ve got is two programs that were originally authorized by Congress, have been repeatedly authorized by Congress. Bipartisan majorities have approved them. Congress is continually briefed on how these are conducted. There are a whole range of safeguards involved. And federal judges are overseeing the entire program throughout.”[41] He also said, “You can’t have 100 percent security and then also have 100 percent privacy and zero inconvenience. You know, we’re going to have to make some choices as a society.”[41]

In separate statements, senior (not mentioned by name in source) Obama administration officials said that Congress had been briefed 13 times on the programs since 2009.[42]

Legislative branch

In contrast to their swift and forceful reactions the previous day to allegations that the government had been conducting surveillance of United States citizens’ telephone records, Congressional leaders initially had little to say about the PRISM program the day after leaked information about the program was published. Several lawmakers declined to discuss PRISM, citing its top-secret classification,[43] and others said that they had not been aware of the program.[44] After statements had been released by the President and the Director of National Intelligence, some lawmakers began to comment:

Senator John McCain (R-AZ)

  • June 9 “We passed the Patriot Act. We passed specific provisions of the act that allowed for this program to take place, to be enacted in operation,”[45]

Senator Dianne Feinstein (D-CA), chair of the Senate Intelligence Committee

  • June 9 “These programs are within the law”, “part of our obligation is keeping Americans safe”, “Human intelligence isn’t going to do it”.[46]
  • June 9 “Here’s the rub: the instances where this has produced good — has disrupted plots, prevented terrorist attacks, is all classified, that’s what’s so hard about this.”[47]
  • June 11 “It went fine…we asked him[ Keith Alexander ] to declassify things because it would be helpful (for people and lawmakers to better understand the intelligence programs).” “I’ve just got to see if the information gets declassified. I’m sure people will find it very interesting.”[48]

Senator Susan Collins (R-ME), member of Senate Intelligence Committee and past member of Homeland Security Committee

  • June 11 “I had, along with Joe Lieberman, a monthly threat briefing, but I did not have access to this highly compartmentalized information” and “How can you ask when you don’t know the program exists?”[49]

Representative John Boehner (R-OH), Speaker of the House of Representatives

  • June 11 “He’s a traitor”[50] (referring to Edward Snowden)

Representative Jim Sensenbrenner (R-WI), principal sponsor of the Patriot Act

  • June 9, “This is well beyond what the Patriot Act allows.”[51] “President Obama’s claim that ‘this is the most transparent administration in history’ has once again proven false. In fact, it appears that no administration has ever peered more closely or intimately into the lives of innocent Americans.”[51]

Representative Mike Rogers (R-MI), a Chairman of the Permanent Select Committee on Intelligence.

  • June 9 “One of the things that we’re charged with is keeping America safe and keeping our civil liberties and privacy intact. I think we have done both in this particular case,”[46]
  • June 9 “Within the last few years this program was used to stop a program, excuse me, to stop a terrorist attack in the United States we know that. It’s, it’s, it’s important, it fills in a little seam that we have and it’s used to make sure that there is not an international nexus to any terrorism event that they may believe is ongoing in the United States. So in that regard it is a very valuable thing,”[52]

Senator Mark Udall (D-CO)

  • June 9 “I don’t think the American public knows the extent or knew the extent to which they were being surveilled and their data was being collected.” “I think we ought to reopen the Patriot Act and put some limits on the amount of data that the National Security (Agency) is collecting,” “It ought to remain sacred, and there’s got to be a balance here. That is what I’m aiming for. Let’s have the debate, let’s be transparent, let’s open this up”.[46]

Representative Todd Rokita (R-IN)

  • June 10 “We have no idea when they [ FISA ] meet, we have no idea what their judgments are”,[53]

Senator Rand Paul (R-KY)

  • June 6 “When the Senate rushed through a last-minute extension of the FISA Amendments Act late last year, I insisted on a vote on my amendment (SA 3436) to require stronger protections on business records and prohibiting the kind of data-mining this case has revealed. Just last month, I introduced S.1037, the Fourth Amendment Preservation and Protection Act,”[54]
  • June 9 “I’m going to be seeing if I can challenge this at the Supreme Court level. I’m going to be asking the Internet providers and all of the phone companies: ask your customers to join me in a class-action lawsuit.”[45]

Representative Luis Gutierrez (D-IL)

  • June 9 “We will be receiving secret briefings and we will be asking, I know I’m going to be asking to get more information. I want to make sure that what they’re doing is harvesting information that is necessary to keep us safe and not simply going into everybody’s private telephone conversations and Facebook and communications. I mean one of the, you know the terrorists win when you debilitate freedom of expression and privacy.”[52]

Judicial branch

The Foreign Intelligence Surveillance Court (FISC) has not acknowledged, denied or confirmed any involvement in the PRISM program at this time. It has not issued any press statement or release relating to the current situation and uncertainty.

Applicable law and practice

On June 8, 2013, the Director of National Intelligence issued a fact sheet stating that PRISM “is not an undisclosed collection or data mining program”, but rather computer software used to facilitate the collection of foreign intelligence information “under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a).”[10] Section 702 provides that “the Attorney General [A.G.] and the Director of National Intelligence [DNI] may authorize jointly, for a period of up to 1 year from the effective date of the authorization, the targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information.”[55] In order to authorize the targeting, the A.G. and DNI need to get an order from the Foreign Intelligence Surveillance Court (FISC) pursuant to Section 702 or certify that “intelligence important to the national security of the United States may be lost or not timely acquired and time does not permit the issuance of an order.”[55] When asking for an order, the A.G. and DNI must certify to FISC that “a significant purpose of the acquisition is to obtain foreign intelligence information.”[55] They do not need to specify which facilities or property that the targeting will be directed at.[55]

After getting a FISC order or determining that there are emergency circumstances, the A.G. and DNI can direct an electronic communication service provider to give them access to information or facilities to carry out the targeting and keep the targeting secret.[55] The provider then has the option to: (1) comply with the directive; (2) reject it; or (3) challenge it to FISC.

If the provider complies with the directive, it is released from liability to its users for providing the information and reimbursed for the cost of providing it.[55]

If the provider rejects the directive, the A.G. may request an order from FISC to enforce it.[55] A provider that fails to comply with FISC’s order can be punished with contempt of court.[55]

Finally, a provider can petition FISC to reject the directive.[55] In case FISC denies the petition and orders the provider to comply with the directive, the provider risks contempt of court if it refuses to comply with FISC’s order.[55] The provider can appeal FISC’s denial to the Foreign Intelligence Surveillance Court of Review and then appeal the Court of Review’s decision to the Supreme Court by a writ of certiorari for review under seal.[55]

The Senate Select Committee on Intelligence and the FISA Courts had been put in place to oversee intelligence operations in the period after the death of J. Edgar Hoover. Beverly Gage of Slate said, “When they were created, these new mechanisms were supposed to stop the kinds of abuses that men like Hoover had engineered. Instead, it now looks as if they have come to function as rubber stamps for the expansive ambitions of the intelligence community. J. Edgar Hoover no longer rules Washington, but it turns out we didn’t need him anyway.”[56]

Involvement of other countries

Australia

The Australian government has said it will investigate the impact of the PRISM program and the use of the Pine Gap surveillance facility on the privacy of Australian citizens.[57]

Canada

Canada’s national cryptologic agency, the Communications Security Establishment, said that commenting on PRISM “would undermine CSE’s ability to carry out its mandate”. Privacy Commissioner Jennifer Stoddart lamented Canada’s standards when it comes to protecting personal online privacy stating “We have fallen too far behind,” Stoddart wrote in her report. “While other nations’ data protection authorities have the legal power to make binding orders, levy hefty fines and take meaningful action in the event of serious data breaches, we are restricted to a ‘soft’ approach: persuasion, encouragement and, at the most, the potential to publish the names of transgressors in the public interest.” And, “when push comes to shove,” Stoddart wrote, “short of a costly and time-consuming court battle, we have no power to enforce our recommendations.”[58]

Germany

Germany did not receive any raw PRISM data, according to a Reuters report.[59]

Israel

Israeli newspaper Calcalist discussed[60] the Business Insider article[61] about the possible involvement of technologies from two secretive Israeli companies in the PRISM program – Verint Systems and Narus.

New Zealand

In New Zealand, University of Otago information science Associate Professor Hank Wolfe said that “under what was unofficially known as the Five Eyes Alliance, New Zealand and other governments, including the United States, Australia, Canada, and Britain, dealt with internal spying by saying they didn’t do it. But they have all the partners doing it for them and then they share all the information.”[62]

United Kingdom

In the United Kingdom, Government Communications Headquarters (GCHQ) has had access to the PRISM program on or before June 2010 and wrote 197 reports with it in 2012 alone. PRISM may have allowed GCHQ to circumvent the formal legal process required to seek personal material.[63][64]

Domestic response

Unbalanced scales.svg
The neutrality of this section is disputed. Please do not remove this message until the dispute is resolved. (June 2013)

The New York Times editorial board charged that the Obama administration “has now lost all credibility on this issue,”[65] and lamented that “for years, members of Congress ignored evidence that domestic intelligence-gathering had grown beyond their control, and, even now, few seem disturbed to learn that every detail about the public’s calling and texting habits now reside in a N.S.A. database.”[66]

Republican and former member of Congress Ron Paul said, “We should be thankful for individuals like Edward Snowden and Glenn Greenwald who see injustice being carried out by their own government and speak out, despite the risk…. They have done a great service to the American people by exposing the truth about what our government is doing in secret.”[67] Paul denounced the government’s secret surveillance program: “The government does not need to know more about what we are doing…. We need to know more about what the government is doing.”[67] He called Congress “derelict in giving that much power to the government,” and said that had he been elected president, he would have ordered searches only when there was probable cause of a crime having been committed, which he said was not how the PRISM program was being operated.[68]

In response to Obama administration arguments that it could stop terrorism in the cases of Najibullah Zazi and David Headley, Ed Pilkington and Nicholas Watt of The Guardian said in regards to the role of PRISM and Boundless Informant interviews with parties involved in the Zazi scheme and court documents lodged in the United States and the United Kingdom indicated that “conventional” surveillance methods such as “old-fashioned tip-offs” of the British intelligence services initiated the investigation into the Zazi case.[69] An anonymous former CIA agent said that in regards to the Headley case, “That’s nonsense. It played no role at all in the Headley case. That’s not the way it happened at all.”[69] Pilkington and Watt concluded that the data-mining programs “played a relatively minor role in the interception of the two plots.”[69] Michael Daly of The Daily Beast stated that even though Tamerlan Tsarnaev had visited Inspire and even though Russian intelligence officials alerted U.S. intelligence officials about Tsarnaev, PRISM did not prevent him from carrying out the Boston bombings, and that the initial evidence implicating him came from his brother Dzhokhar Tsarnaev and not from federal intelligence. In addition Daly pointed to the fact that Faisal Shahzad visited Inspire but that federal authorities did not stop his attempted terrorist plot. Daly concluded “The problem is not just what the National Security Agency is gathering at the risk of our privacy but what it is apparently unable to monitor at the risk of our safety.”[70] In addition, political commentator Bill O’Reilly criticized the government, saying that PRISM did not stop the Boston bombings.[71]

In a blog post, David Simon, the creator of The Wire, compared the NSA’s programs, including PRISM, to a 1980s effort by the City of Baltimore to add dialed number recorders to all pay phones to know which individuals were being called by the callers;[72] the city believed that drug traffickers were using pay phones and pagers, and a municipal judge allowed the city to place the recorders. The placement of the dialers formed the basis of the show’s first season. Simon argued that the media attention regarding the NSA programs is a “faux scandal.”[72][73] George Takei, an actor who had experienced Japanese American internment, said that due to his memories of the internment, he felt concern towards the NSA surveillance programs that had been revealed.[74]

The Electronic Frontier Foundation (EFF), an international non-profit digital-rights group based in the U.S., is hosting a tool, by which an American resident can write to their government representatives regarding their opposition to mass spying.[75]

On June 11, 2013, the American Civil Liberties Union filed a lawsuit against the NSA citing that PRISM “violates Americans’ constitutional rights of free speech, association, and privacy”.[76]

International response

Reactions of Internet users in China were mixed between viewing a loss of freedom worldwide and seeing state surveillance coming out of secrecy. The story broke just before US President Barack Obama and Chinese President Xi Jinping met in California.[77][78] When asked about NSA hacking China, the spokeswoman of Ministry of Foreign Affairs of the People’s Republic of China said “China strongly advocates cybersecurity”.[79] The party-owned newspaper Liberation Daily described this surveillance like Nineteen Eighty-Four-style.[80] Hong Kong legislators Gary Fan and Claudia Mo wrote a letter to Obama, stating “the revelations of blanket surveillance of global communications by the world’s leading democracy have damaged the image of the U.S. among freedom-loving peoples around the world.”[81]

Sophie in ‘t Veld, a Dutch Member of the European Parliament, called PRISM “a violation of EU laws”.[82]

Protests at Checkpoint Charlie in Berlin

The German Federal Commissioner for Data Protection and Freedom of Information, Peter Schaar, condemned the program as “monstrous”.[83] He further added that White House claims do “not reassure me at all” and that “given the large number of German users of Google, Facebook, Apple or Microsoft services, I expect the German government […] is committed to clarification and limitation of surveillance.” Steffen Seibert, press secretary of the Chancellor’s office, announced that Angela Merkel will put these issues on the agenda of the talks with Barack Obama during his pending visit in Berlin.[84]

The Italian president of the Guarantor for the protection of personal data, Antonello Soro, said that the surveillance dragnet “would not be legal in Italy” and would be “contrary to the principles of our legislation and would represent a very serious violation”.[85]

William Hague, the foreign secretary of the United Kingdom, dismissed accusations that British security agencies had been circumventing British law by using information gathered on British citizens by Prism[86] saying, “Any data obtained by us from the United States involving UK nationals is subject to proper UK statutory controls and safeguards.”[86] David Cameron said Britain’s spy agencies that received data collected from PRISM acted within the law: “I’m satisfied that we have intelligence agencies that do a fantastically important job for this country to keep us safe, and they operate within the law.”[86][87] Malcolm Rifkind, the chairman of parliament’s Intelligence and Security Committee, said that if the British intelligence agencies were seeking to know the content of emails about people living in the UK, then they actually have to get lawful authority.[87] The UK’s Information Commissioner’s Office was more cautious, saying it would investigate PRISM alongside other European data agencies: “There are real issues about the extent to which U.S. law agencies can access personal data of UK and other European citizens. Aspects of U.S. law under which companies can be compelled to provide information to U.S. agencies potentially conflict with European data protection law, including the UK’s own Data Protection Act. The ICO has raised this with its European counterparts, and the issue is being considered by the European Commission, who are in discussions with the U.S. Government.”[82]

Ai Weiwei, a Chinese dissident, said “Even though we know governments do all kinds of things I was shocked by the information about the US surveillance operation, Prism. To me, it’s abusively using government powers to interfere in individuals’ privacy. This is an important moment for international society to reconsider and protect individual rights.”[88]

Kim Dotcom, a German-Finnish Internet entrepreneur who owned Megaupload, which was closed by the U.S. federal government, said “We should heed warnings from Snowden because the prospect of an Orwellian society outweighs whatever security benefits we derive from Prism or Five Eyes.”[89] The Hong Kong law firm representing Dotcom expressed a fear that the communication between Dotcom and the firm had been compromised by U.S. intelligence programs.[90]

Russia has offered to consider an asylum request from Edward Snowden.[91]

Taliban spokesperson Zabiullah Mujahid said “We knew about their past efforts to trace our system. We have used our technical resources to foil their efforts and have been able to stop them from succeeding so far.”[92][93]

Related government Internet surveillance programs

A parallel program, code-named BLARNEY, gathers up metadata as it streams past choke points along the backbone of the Internet. BLARNEY’s summary, set down in the slides alongside a cartoon insignia of a shamrock and a leprechaun hat, describes it as “an ongoing collection program that leverages IC [intelligence community] and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.”[94]

A related program, a big data visualization system based on cloud computing and free and open-source software (FOSS) technology known as “Boundless Informant”, was disclosed in documents leaked to The Guardian and reported on June 8, 2013. A leaked, top secret map allegedly produced by Boundless Informant revealed the extent of NSA surveillance in the U.S.[95]

http://en.wikipedia.org/wiki/PRISM_%28surveillance_program%29

ThinThread

ThinThread is the name of a project that the United States National Security Agency (NSA) pursued during the 1990s, according to a May 17, 2006 article in The Baltimore Sun.[1] The program involved wiretapping and sophisticated analysis of the resulting data, but according to the article, the program was discontinued three weeks before the September 11, 2001 attacks due to the changes in priorities and the consolidation of U.S. intelligence authority.[2] The “change in priority” consisted of the decision made by the director of NSA General Michael V. Hayden to go with a concept called Trailblazer, despite the fact that ThinThread was a working prototype that protected the privacy of U.S. citizens.

ThinThread was dismissed and replaced by the Trailblazer Project, which lacked the privacy protections.[3] A consortium led by Science Applications International Corporation was awarded a $280 million contract to develop Trailblazer in 2002.[4]

http://en.wikipedia.org/wiki/ThinThread

Trailblazer

Trailblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as cell phones and e-mail.[1][2] It ran over budget, failed to accomplish critical goals, and was cancelled.

NSA whistleblowers J. Kirk Wiebe, William Binney, Ed Loomis, and House Permanent Select Committee on Intelligence staffer Diane Roark complained to the Department of Defense’s Inspector General (IG) about waste, fraud, and abuse in the program, and the fact that a successful operating prototype existed, but was ignored when the Trailblazer program was launched. The complaint was accepted by the IG and an investigation began that lasted until mid-2005 when the final results were issued. The results were largely hidden, as the report given to the public was heavily (90%) redacted, while the original report was heavily classified, thus restricting the ability of most people to see it.

The people who filed the IG complaint were later raided by armed Federal Bureau of Investigation (FBI) agents. While the Government threatened to prosecute all who signed the IG report, it ultimately chose to pursue an NSA Senior Executive — Thomas Andrews Drake — who helped with the report internally to NSA and who had spoken with a reporter about the project. Drake was later charged under the Espionage Act of 1917. His defenders claimed this was retaliation.[3][4] The charges against him were later dropped, and he agreed to plead guilty to having committed a misdemeanor under the Computer Fraud and Abuse Act, something that Jesselyn Radack of the Government Accountability Project (which helped represent him) called an “act of civil disobedience”.[5]

Background

Trailblazer was chosen over a similar program named ThinThread, a less costly project which had been designed with built-in privacy protections for United States citizens.[4][3] Trailblazer was later linked to the NSA electronic surveillance program and the NSA warrantless surveillance controversy.[3]

In 2002 a consortium led by Science Applications International Corporation was chosen by the NSA to produce a technology demonstration platform in a contract worth $280 million. Project participants included Boeing, Computer Sciences Corporation, and Booz Allen Hamilton. The project was overseen by NSA Deputy Director William B. Black, Jr., an NSA worker who had gone to SAIC, and then been re-hired back to NSA by NSA director Michael Hayden in 2000.[6][7][8] SAIC had also hired a former NSA director to its management; Bobby Inman.[9] SAIC also participated in the concept definition phase of Trailblazer.[10][11]

Redacted version of the DoD Inspector General audit, obtained through the Freedom of Information Act by the Project on Government Oversight and others. [12][5]

The NSA Inspector General issued a report on Trailblazer that “discussed improperly based contract cost increases, non-conformance in the management of the Statement of Work, and excessive labor rates for contractor personnel.” [13]

In 2004 the DoD IG report criticized the program (see the Whistleblowing section below). It said that the “NSA ‘disregarded solutions to urgent national security needs'” and “that TRAILBLAZER was poorly executed and overly expensive …” Several contractors for the project were worried about cooperating with DoD’s audit for fear of “management reprisal.”[5] The Director of NSA “nonconcurred” with several statements in the IG audit, and the report contains a discussion of those disagreements.[14]

In 2005, NSA director Michael Hayden told a Senate hearing that the Trailblazer program was several hundred million dollars over budget and years behind schedule.[15] In 2006 the program was shut down,[3] after having cost billions of US Dollars.[16] Several anonymous NSA sources told Hosenball of Newsweek later on that the project was a “wasteful failure”.[17]

The new project replacing Trailblazer is called Turbulence.[3]

Whistleblowing

According to a 2011 New Yorker article, in the early days of the project several NSA employees met with Diane S Roark, an NSA budget expert on the House Intelligence Committee. They aired their grievances about Trailblazer. In response, NSA director Michael Hayden sent out a memo saying that “individuals, in a session with our congressional overseers, took a position in direct opposition to one that we had corporately decided to follow … Actions contrary to our decisions will have a serious adverse effect on our efforts to transform N.S.A., and I cannot tolerate them.”[3]

In September 2002, several people filed a complaint with the Department of Defense IG’s office regarding problems with Trailblazer: they included Roark (aforementioned), ex-NSA senior analysts Bill Binney, Kirk Wiebe, and Senior Computer Systems Analyst Ed Loomis, who had quit the agency over concerns about its mismanagement of acquisition and allegedly illegal domestic spying.[3][18][19] A major source for the report was NSA senior officer Thomas Andrews Drake. Drake had been complaining to his superiors for some time about problems at the agency, and about the superiority of ThinThread over Trailblazer, for example, at protecting privacy.[19] Drake gave info to DoD during its investigation of the matter.[19] Roark also went to her boss at the House committee, Porter Goss, about problems, but was rebuffed.[20] She also attempted to contact William Renquist, the Supreme Court Chief Justice at the time.[19]

Drake’s own boss, Maureen Baginski, the third-highest officer at NSA, quit partly over concerns about the legality of its behavior.[3]

In 2003, the NSA IG (not the DoD IG)[19] had declared Trailblazer an expensive failure.[21] It had cost more than $1 billion.[8][22][23]

In 2005, the DoD IG produced a report on the result of its investigation of the complaint of Roark and the others in 2002. This report was not released to the public, but it has been described as very negative.[18] Mayer writes that it hastened the closure of Trailblazer, which was at the time in trouble from congress for being over budget.[3]

In November 2005, Drake contacted Siobhan Gorman, a reporter of The Baltimore Sun.[24][17][25] Gorman wrote several articles about problems at the NSA, including articles on Trailblazer. This series got her an award from the Society of Professional Journalists.[17]

In 2005, President George W. Bush ordered the FBI to find whoever had disclosed information about the NSA electronic surveillance program and its disclosure in the New York Times. Eventually, this investigation led to the people who had filed the 2002 DoD IG request, even though they had nothing to do with the New York Times disclosure. In 2007, the houses of Roark, Binney, and Wiebe were raided by armed FBI agents. According to Mayer, Binney claims the FBI pointed guns at his head and that of his wife. Wiebe said it reminded him of the Soviet Union.[3][18] None of these people were ever charged with any crime. Four months later, Drake was raided in November 2007 and his computers and documents were confiscated.

In 2010 Drake was indicted by the U.S. Department of Justice on charges of obstructing justice, providing false information, and violating the Espionage Act of 1917,[17][26][27] part of President Barack Obama’s crackdown on whistleblowers and “leakers”.[24][17][28][18] The government tried to get Roark to testify to a conspiracy, and made similar requests to Drake, offering him a plea bargain. They both refused.[3]

In June 2011, the ten original charges against Drake were dropped, instead he pleaded guilty to a misdemeanor.[5]

http://www.youtube.com/watch?v=1AXwwSq_me4

Boundless Informant

Boundless Informant is a big data analysis and data visualization system used by the United States National Security Agency (NSA) to give NSA managers summaries of NSA’s world wide data collection activities.[1] It is described in an unclassified, For Official Use Only Frequently Asked Questions (FAQ) memo published by The Guardian.[2] According to a Top Secret heat map display also published by The Guardian and allegedly produced by the Boundless Informant program, almost 3 billion data elements from inside the United States were captured by NSA over a 30-day period ending in March 2013.

Data analyzed by Boundless Informant includes electronic surveillance program records (DNI) and telephone call metadata records (DNR) stored in an NSA data archive called GM-PLACE. It does not include FISA data, according to the FAQ memo. PRISM, a government codename for a collection effort known officially as US-984XN, which was revealed at the same time as Boundless Informant, is one source of DNR data. According to the map, Boundless Informant summarizes data records from 504 separate DNR and DNI collection sources (SIGADs). In the map, countries that are under surveillance are assigned a color from green, representing least coverage to red, most intensive.[3][4]

History

Slide showing that much of the world’s communications flow through the US.

Intelligence gathered by the United States government inside the United States or specifically targeting US citizens is legally required to be gathered in compliance with the Foreign Intelligence Surveillance Act of 1978 (FISA) and under the authority of the Foreign Intelligence Surveillance Court (FISA court).[5][6][7]

NSA global data mining projects have existed for decades, but recent programs of intelligence gathering and analysis that include data gathered from inside the United States such as PRISM were enabled by changes to US surveillance law introduced under President Bush and renewed under President Obama in December 2012.[8]

Boundless Informant was first publicly revealed on June 8, 2013, after classified documents about the program were leaked to The Guardian.[1][9] The newspaper identified its informant, at his request, as Edward Snowden, who worked at the NSA for the defense contractor Booz Allen Hamilton.[10]

Technology

According to published slides, Boundless Informant leverages Free and Open Source Software—and is therefore “available to all NSA developers”—and corporate services hosted in the cloud. The tool uses HDFS, MapReduce, and Cloudbase for data processing.[11]

Legality and FISA Amendments Act of 2008

The FISA Amendments Act (FAA) Section 702 is referenced in PRISM documents detailing the electronic interception, capture and analysis of metadata. Many reports and letters of concern written by members of Congress suggest that this section of FAA in particular is legally and constitutionally problematic, such as by targeting U.S. persons, insofar as “Collections occur in U.S.” as published documents indicate.[12][13][14][15]

The ACLU has asserted the following regarding the FAA: “Regardless of abuses, the problem with the FAA is more fundamental: the statute itself is unconstitutional.”[16]

Senator Rand Paul is introducing new legislation called the Fourth Amendment Restoration Act of 2013 to stop the NSA or other agencies of the United States government from violating the Fourth Amendment to the U.S. Constitution using technology and big data information systems like PRISM and Boundless Informant.[17][18]

http://en.wikipedia.org/wiki/Boundless_Informant

ECHELON

ECHELON is a name used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UKUSA Security Agreement[1] (Australia, Canada, New Zealand, the United Kingdom, and the United States, referred to by a number of abbreviations, including AUSCANNZUKUS[1] and Five Eyes).[2][3] It has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.[4]

ECHELON, according to information in the European Parliament document, “On the existence of a global system for the interception of private and commercial communications (ECHELON interception system)” was created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s.[5]

The system has been reported in a number of public sources.[6] Its capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001,[5] and by author James Bamford in his books on the National Security Agency of the United States.[4] The European Parliament stated in its report that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system. The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, public switched telephone networks (which once carried most Internet traffic) and microwave links.[5]

Bamford describes the system as the software controlling the collection and distribution of civilian telecommunications traffic conveyed using communication satellites, with the collection being undertaken by ground stations located in the footprint of the downlink leg.

Organization

UKUSA Community
Map of UKUSA Community countries with Ireland

Australia
Canada
New Zealand
United Kingdom
United States of America

The UKUSA intelligence community was assessed by the European Parliament (EP) in 2000 to include the signals intelligence agencies of each of the member states:

  • the Government Communications Headquarters of the United Kingdom,
  • the National Security Agency of the United States,
  • the Communications Security Establishment of Canada,
  • the Defence Signals Directorate of Australia, and
  • the Government Communications Security Bureau of New Zealand.
  • the National SIGINT Organisation (NSO) of The Netherlands

The EP report concluded that it seemed likely that ECHELON is a method of sorting captured signal traffic, rather than a comprehensive analysis tool.[5]

Capabilities

The ability to intercept communications depends on the medium used, be it radio, satellite, microwave, cellular or fiber-optic.[5] During World War II and through the 1950s, high frequency (“short wave”) radio was widely used for military and diplomatic communication,[7] and could be intercepted at great distances.[5] The rise of geostationary communications satellites in the 1960s presented new possibilities for intercepting international communications. The report to the European Parliament of 2001 states: “If UKUSA states operate listening stations in the relevant regions of the earth, in principle they can intercept all telephone, fax and data traffic transmitted via such satellites.”[5]

The role of satellites in point-to-point voice and data communications has largely been supplanted by fiber optics; in 2006, 99% of the world’s long-distance voice and data traffic was carried over optical-fiber.[8] The proportion of international communications accounted for by satellite links is said to have decreased substantially over the past few years[when?] in Central Europe to an amount between 0.4% and 5%.[5] Even in less-developed parts of the world, communications satellites are used largely for point-to-multipoint applications, such as video.[9] Thus, the majority of communications can no longer be intercepted by earth stations; they can only be collected by tapping cables and intercepting line-of-sight microwave signals, which is possible only to a limited extent.[5]

One method of interception is to place equipment at locations where fiber optic communications are switched. For the Internet, much of the switching occurs at relatively few sites. There have been reports of one such intercept site, Room 641A, in the United States. In the past[when?] much Internet traffic was routed through the U.S. and the UK, but this has changed; for example, in 2000, 95% of intra-German Internet communications was routed via the DE-CIX Internet exchange point in Frankfurt.[5] A comprehensive worldwide surveillance network is possible only if clandestine intercept sites are installed in the territory of friendly nations, and/or if local authorities cooperate. The report to the European Parliament points out that interception of private communications by foreign intelligence services is not necessarily limited to the U.S. or British foreign intelligence services.[5]

Most reports on ECHELON focus on satellite interception; testimony before the European Parliament indicated that separate but similar UK-US systems are in place to monitor communication through undersea cables, microwave transmissions and other lines.[10]

Controversy

See also: Industrial espionage

Intelligence monitoring of citizens, and their communications, in the area covered by the AUSCANNZUKUS security agreement has caused concern. British journalist Duncan Campbell and New Zealand journalist Nicky Hager asserted in the 1990s that the United States was exploiting ECHELON traffic for industrial espionage, rather than military and diplomatic purposes.[10] Examples alleged by the journalists include the gear-less wind turbine technology designed by the German firm Enercon[5][11] and the speech technology developed by the Belgian firm Lernout & Hauspie.[12] An article in the US newspaper Baltimore Sun reported in 1995 that European aerospace company Airbus lost a $6 billion contract with Saudi Arabia in 1994 after the US National Security Agency reported that Airbus officials had been bribing Saudi officials to secure the contract.[13][14]

In 2001, the Temporary Committee on the ECHELON Interception System recommended to the European Parliament that citizens of member states routinely use cryptography in their communications to protect their privacy, because economic espionage with ECHELON has been conducted by the US intelligence agencies.[5]

Bamford provides an alternative view, highlighting that legislation prohibits the use of intercepted communications for commercial purposes, although he does not elaborate on how intercepted communications are used as part of an all-source intelligence process.

Hardware

According to its website, the U.S. National Security Agency (NSA) is “a high technology organization … on the frontiers of communications and data processing”. In 1999 the Australian Senate Joint Standing Committee on Treaties was told by Professor Desmond Ball that the Pine Gap facility was used as a ground station for a satellite-based interception network. The satellites were said to be large radio dishes between 20 and 100 meters in diameter in geostationary orbits.[citation needed] The original purpose of the network was to monitor the telemetry from 1970s Soviet weapons, air defence radar, communications satellites and ground based microwave communications.[15]

Name

The European Parliament’s Temporary Committee on the ECHELON Interception System stated: “It seems likely, in view of the evidence and the consistent pattern of statements from a very wide range of individuals and organisations, including American sources, that its name is in fact ECHELON, although this is a relatively minor detail.”[5] The U.S. intelligence community uses many code names (see, for example, CIA cryptonym).

Former NSA employee Margaret Newsham claims that she worked on the configuration and installation of software that makes up the ECHELON system while employed at Lockheed Martin, for whom she worked from 1974 to 1984 in Sunnyvale, California, US, and in Menwith Hill, England, UK.[16] At that time, according to Newsham, the code name ECHELON was NSA’s term for the computer network itself. Lockheed called it P415. The software programs were called SILKWORTH and SIRE. A satellite named VORTEX intercepted communications. An image available on the internet of a fragment apparently torn from a job description shows Echelon listed along with several other code names.[17]

Ground stations

The 2001 European Parliamentary (EP) report[5] lists several ground stations as possibly belonging to, or participating in, the ECHELON network. These include:

Likely satellite intercept stations

The following stations are listed in the EP report (p. 54 ff) as likely to have, or to have had, a role in intercepting transmissions from telecommunications satellites:

  • Hong Kong (since closed)
  • Australian Defence Satellite Communications Station (Geraldton, Western Australia)
  • Menwith Hill (Yorkshire, U.K.) Map (reportedly the largest Echelon facility)[18]
  • Misawa Air Base (Japan) Map
  • GCHQ Bude, formerly known as GCHQ CSO Morwenstow, (Cornwall, U.K.) Map
  • Pine Gap (Northern Territory, Australia – close to Alice Springs) Map
  • Sugar Grove (West Virginia, U.S.) Map
  • Yakima Training Center (Washington, U.S.) Map
  • GCSB Waihopai (New Zealand)
  • GCSB Tangimoana (New Zealand)
  • CFS Leitrim (Ontario, Canada)
  • Teufelsberg (Berlin, Germany) (closed 1992)

Other potentially related stations

The following stations are listed in the EP report (p. 57 ff) as ones whose roles “cannot be clearly established”:

  • Ayios Nikolaos (Cyprus – U.K.)
  • BadAibling Station (BadAibling, Germany – U.S.)
    • relocated to Griesheim in 2004[19]
    • deactivated in 2008[20]
  • Buckley Air Force Base (Aurora, Colorado)
  • Fort Gordon (Georgia, U.S.)
  • Gander (Newfoundland & Labrador, Canada)
  • Guam (Pacific Ocean, U.S.)
  • Kunia Regional SIGINT Operations Center (Hawaii, U.S.)
  • Lackland Air Force Base, Medina Annex (San Antonio, Texas)

http://en.wikipedia.org/wiki/ECHELON

Room 641A

Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency that commenced operations in 2003 and was exposed in 2006.[1][2]

Description

Room 641A is located in the SBC Communications building at 611 Folsom Street, San Francisco, three floors of which were occupied by AT&T before SBC purchased AT&T.[1] The room was referred to in internal AT&T documents as the SG3 [Study Group 3] Secure Room. It is fed by fiber optic lines from beam splitters installed in fiber optic trunks carrying Internet backbone traffic[3] and, as analyzed by J. Scott Marcus, a former CTO for GTE and a former adviser to the FCC, who has access to all Internet traffic that passes through the building, and therefore “the capability to enable surveillance and analysis of internet content on a massive scale, including both overseas and purely domestic traffic.”[4] Former director of the NSA’s World Geopolitical and Military Analysis Reporting Group, William Binney, has estimated that 10 to 20 such facilities have been installed throughout the United States.[2]

The room measures about 24 by 48 feet (7.3 by 15 m) and contains several racks of equipment, including a Narus STA 6400, a device designed to intercept and analyze Internet communications at very high speeds.[1]

The very existence of the room was revealed by a former AT&T technician, Mark Klein, and was the subject of a 2006 class action lawsuit by the Electronic Frontier Foundation against AT&T.[5] Klein claims he was told that similar black rooms are operated at other facilities around the country.

Room 641A and the controversies surrounding it were subjects of an episode of Frontline, the current affairs documentary program on PBS. It was originally broadcast on May 15, 2007. It was also featured on PBS’s NOW on March 14, 2008. The room was also covered in the PBS Nova episode “The Spy Factory”.

Lawsuit

Basic diagram of how the alleged wiretapping was accomplished. From EFF court filings[4]

More complicated diagram of how it allegedly worked. From EFF court filings.[3] See bottom of the file page for enlarged and rotated version.

Main article: Hepting v. AT&T

The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on January 31, 2006, accusing the telecommunication company of violating the law and the privacy of its customers by collaborating with the National Security Agency (NSA) in a massive, illegal program to wiretap and data-mine Americans’ communications. On July 20, 2006, a federal judge denied the government’s and AT&T’s motions to dismiss the case, chiefly on the ground of the States Secrets Privilege, allowing the lawsuit to go forward. On August 15, 2007, the case was heard by the Ninth Circuit Court of Appeals and was dismissed on December 29, 2011 based on a retroactive grant of immunity by Congress for telecommunications companies that cooperated with the government. The U.S. Supreme Court declined to hear the case.[6] A different case by the EFF was filed on September 18, 2008, titled Jewel v. NSA.

http://en.wikipedia.org/wiki/Room_641A

List of government surveillance projects for the United States

United States

A top secret document leaked by Edward Snowden to The Guardian in 2013, originally due to be declassified on 12 April 2038.

http://en.wikipedia.org/wiki/List_of_government_surveillance_projects

Related Posts On Pronk Palisades

James Bamford — The National Security Agency (NSA) — Videos

National Security Agency (NSA) Wants To Build Supercomputer To Crack All Encryption — Videos

National Security Agency (NSA) Intercepts FedX and UPS Packages To Install Malware Software — Bugs iPhones and Laptops — Videos

No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

Enemy Of The State: Life Imitating Art –National Security Agency Targets American People — Vidoes

Big Brother Barack Targets All The American People As Enemies of The State and Democratic Party — National Security Agency’s PRISM Is The Secret Security Surveillance State (S4) Means of Invading Privacy and Limiting Liberty — Outrageous Overreach–Videos

National Security Agency (NSA) and Federal Bureau Investigation (FBI) Secret Security Surveillance State (S4) Uses Stellar Wind and PRISM To Create Secret Dossiers On All American Citizen Targets Similar To East Germany Stasi Files–Videos

NSA’s PRISM Political Payoff: 40 Million Plus Foreigners Are In USA As Illegal Aliens! — 75% Plus Lean Towards Democratic Party — Pathway To One Party Rule By 2025 If Senate Bill Becomes Law Giving Illegal Aliens Legal Status — 25 Million American Citizens Looking For Full Time Jobs! — Videos

Amnesty Before Enforcement — Congressional Gangsters’ Comprehensive Immigration “Reform” Bill Targets American Citizens For Unemployment — American Citizens Want All Illegal Aliens Deported Not Rewarded With Legal Status — Target The Amnesty Illegal Alien Gangsters For Defeat — Videos

U.S. Hacking China and Hong Kong — Videos

Digital Campaigns Using Microtargeting and Data Mining To Target Voters — Videos

Sasha Issenberg — The Victory Lab: The Secret Science of Winning Campaigns — Videos

Related Posts on Pronk Pops

Pronk Pops Show 112, June 7, 2013, Segment 0: Marxist-Leninists Go To The Wall With Holder — The Man Who Knows Where The Bodies Are Buried Enjoys President Obama’s Full Confidence Says Political Fixer Valerie Jarrett — Wall Street Wants Holder To Hang On — American People Say Hit The Road Jack — Videos

Pronk Pops Show 112, June 7, 2013: Segment 1: U.S. Real Gross Domestic Product Growth Still Stagnating At 2.4% in First Quarter of 2013 As Institute for Supply Management Factory Index Sinks to 49.0 Lowest Since June 2009 — Videos

Pronk Pops Show 112, June 7, 2013, Segment 2: Federal Advisory Council (FAC) May 17, 2013 Report — No Exit To A Bridge Over Troubled Waters — Keyboarding Money — We’re screwed! — Videos

Pronk Pops Show 112, June 7, 2013, Segment 3: Official Unemployment Rate Rises To 7.6% with 11.8 Million Americans Unemployed and Only 175,000 Jobs Created in May — Videos

Pronk Pops Show 112, June 7, 2013, Segment 4: No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 222-233

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or DownloadShow 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 232, March 26, 2014, Story 1: April Fools’ Day Joke — Obamacare Open Enrollment Date Extended to April 15, 2014! — Is The Backend of Website Working? — Videos

Posted on March 26, 2014. Filed under: Blogroll, Budgetary Policy, Communications, Disasters, Economics, Fiscal Policy, Government Spending, Health Care, Health Care Insurance, Illegal Immigration, Immigration, Media, Medicine, Networking, Photos, Politics, Polls, Public Sector Unions, Security, Social Science, Tax Policy, Taxes, Technology, Unemployment, Unions, United States Constitution, Videos, Violence, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

 

 

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 232: March 26, 2014

Pronk Pops Show 231: March 25, 2014

Pronk Pops Show 230: March 24, 2014

Pronk Pops Show 229: March 21, 2014

Pronk Pops Show 228: March 20, 2014

Pronk Pops Show 227: March 19, 2014

Pronk Pops Show 226: March 18, 2014

Pronk Pops Show 225: March 17, 2014

Pronk Pops Show 224: March 7, 2014

Pronk Pops Show 223: March 6, 2014

Pronk Pops Show 222: March 3, 2014

Pronk Pops Show 221: February 28, 2014

Pronk Pops Show 220: February 27, 2014

Pronk Pops Show 219: February 26, 2014

Pronk Pops Show 218: February 25, 2014

Pronk Pops Show 217: February 24, 2014

Pronk Pops Show 216: February 21, 2014

Pronk Pops Show 215: February 20, 2014

Pronk Pops Show 214: February 19, 2014

Pronk Pops Show 213: February 18, 2014

Pronk Pops Show 212: February 17, 2014

Pronk Pops Show 211: February 14, 2014

Pronk Pops Show 210: February 13, 2014

Pronk Pops Show 209: February 12, 2014

Pronk Pops Show 208: February 11, 2014

Pronk Pops Show 207: February 10, 2014

Pronk Pops Show 206: February 7, 2014

Pronk Pops Show 205: February 5, 2014

Pronk Pops Show 204: February 4, 2014

Pronk Pops Show 203: February 3, 2014

Pronk Pops Show 202: January 31, 2014

Pronk Pops Show 201: January 30, 2014

Pronk Pops Show 200: January 29, 2014

Pronk Pops Show 199: January 28, 2014

Pronk Pops Show 198: January 27, 2014

Pronk Pops Show 197: January 24, 2014

Pronk Pops Show 196: January 22, 2014

Pronk Pops Show 195: January 21, 2014

Pronk Pops Show 194: January 17, 2014

Pronk Pops Show 193: January 16, 2014

Pronk Pops Show 192: January 14, 2014

Pronk Pops Show 191: January 13, 2014

Pronk Pops Show 190: January 10, 2014

Pronk Pops Show 189: January 9, 2014

Pronk Pops Show 188: January 8, 2014

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Story 1: April Fools’ Day Joke — Obamacare Open Enrollment Date Extended to April 15, 2014! — Is The Backend of Website Working? — Videos

 

Speaker Boehner Blast The White House For Another Delay To Health Care Law The Five

 

White House Extends ObamaCare Enrollment Deadline: Does It Matter?

Obamacare – Another Day, Another Delay – Obamacare’s Secret Mandate Exemption – Cavuto

Glenn BECK reacts to Sen. John McCain’s epic flip-flop ON OBAMACARE

ObamaCare Premiums To Rise

Obamacare premiums

 

Avik Roy on Obamacare’s 2015 Premium Increases 2014-03-19

Avik Roy on Obamacare’s Insurer “Bailout” 2013-12-03

AVIK Roy on Obamacare’s Surging Insurance Premiums 2013 09 25

Harry Reid – Obamacare Delayed Because People Are Not Educated About How to Use the Intern

Is this a joke? Boehner blasts latest Obamacare delay

Here Are All the Times the White House Said Latest Obamacare Delay Wouldn’t Happen

Krauthammer’s Take: If Back End of Healthcare.gov Isn’t Fixed, ‘All Hell’s Going to Break Loose’

Obamacare “Back-End” Problem – Special Report All Star Panel

Sebelius admits back end payment systems for Obamacare still not built

CBS: Despite White House Claims The Backend Of Obamacare Website Is Still Not Working

Avik Roy on Doctors Boycotting Obamacare’s Medicaid Expansion 2013-12-09

John C. Goodman – Obamacare Alternatives – 08-19-13

John C. Goodman on Replacing Obamacare and Curing the Healthcare Crisis: Part 1 of 2

John C. Goodman on Replacing Obamacare and Curing the Healthcare Crisis: Part 2 of 2

 

 

 

Boehner ‘What the hell is this, a joke?’

“What the hell is this, a joke?” Boehner said at his weekly press conference.

He was responding to the administration’s announcement on Tuesday evening that people who had begun the process of signing up for insurance through the federal exchanges would have until mid-April to do so, instead of March 31.

 

The Speaker called the move “another deadline made meaningless,” adding it to a litany of unilateral changes that the administration has made to the law.

“This is part of a long-term pattern of this administration manipulating the law for its own convenience,” Boehner said. “It’s not hard to understand why the American people question this administration’s commitment to the rule of law.”

The Speaker mocked the use of the “honor system” to determine who was eligible for an extension after the administration said it would make no effort to ensure that people had actually begun the process of signing up by March 31.

“Why don’t they just say, ‘We’ve moved the date to April 15’? Because that’s in effect what they’ve done,” Boehner said.

Administration officials cited “a surge in demand” as a reason for the extension, which they said is aimed at people with “special circumstances and complex cases.”

“Open enrollment ends March 31,” Health and Human Services spokeswoman Joanne Peters told The Hill in an email Tuesday evening. “We are experiencing a surge in demand and are making sure that we will be ready to help consumers who may be in line by the deadline to complete enrollment — either online or over the phone.”

Republicans have attacked the healthcare law from virtually every angle, criticizing both its underlying regulations and the administration’s repeated decision to delay or not fully enforce them. Boehner has criticized the early problems with the HealthCare.gov website, and on Wednesday, he was pressed on why people shouldn’t have more time to sign up for insurance because of them.

“The dates are the dates, and the law is the law,” he said. “The president doesn’t have the authority to change the law whenever he wants, which he continues to do.”

Boehner added later in the press conference: “The law says that enrollment stops at the end of March. That’s what the law says. I’ve got to live by the law; you’ve got to live by the law; the American people have got to live by the law. And guess what? The president needs to live by the law as well.”

In response to Boehner, Peters compared the situation to Election Day, when voters who are in line when the polls close are still allowed to cast their ballot.

“The law is the law. Consumers need to know the deadline is March 31,” she said. “But just like on Election Day, if you are in line when we close, you get to enroll. We’re experiencing near-record volume and the site, and we’re not going to turn people away who tried and couldn’t complete their enrollment. This is about helping people who want to get health insurance.”

Peters noted that a similar extension was offered under the Bush administration in 2006 for the implementation of the Medicare prescription drug benefit.

http://thehill.com/blogs/healthwatch/health-reform-implementation/201791-boehner-what-the-hell-is-this-a-joke

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 222-231

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or DownloadShow 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 231, March 25, 2014, Story 1: Nuclear Security Summit 2014 — Loose Nuke War Game — 1 Nuclear Weapon — NYC or Washington? — You Choose — Videos

Posted on March 25, 2014. Filed under: American History, Blogroll, Chemical Explosion, Communications, Disasters, Education, Energy, European History, Foreign Policy, Genocide, Government, Government Dependency, History, Media, Nuclear, Philosophy, Photos, Politics, Scandals, Security, Technology, Terror, Terrorism, United States Constitution, Videos, Violence, War, Wealth, Weapons, Weapons of Mass Destruction, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 231: March 25, 2014

Pronk Pops Show 230: March 24, 2014

Pronk Pops Show 229: March 21, 2014

Pronk Pops Show 228: March 20, 2014

Pronk Pops Show 227: March 19, 2014

Pronk Pops Show 226: March 18, 2014

Pronk Pops Show 225: March 17, 2014

Pronk Pops Show 224: March 7, 2014

Pronk Pops Show 223: March 6, 2014

Pronk Pops Show 222: March 3, 2014

Pronk Pops Show 221: February 28, 2014

Pronk Pops Show 220: February 27, 2014

Pronk Pops Show 219: February 26, 2014

Pronk Pops Show 218: February 25, 2014

Pronk Pops Show 217: February 24, 2014

Pronk Pops Show 216: February 21, 2014

Pronk Pops Show 215: February 20, 2014

Pronk Pops Show 214: February 19, 2014

Pronk Pops Show 213: February 18, 2014

Pronk Pops Show 212: February 17, 2014

Pronk Pops Show 211: February 14, 2014

Pronk Pops Show 210: February 13, 2014

Pronk Pops Show 209: February 12, 2014

Pronk Pops Show 208: February 11, 2014

Pronk Pops Show 207: February 10, 2014

Pronk Pops Show 206: February 7, 2014

Pronk Pops Show 205: February 5, 2014

Pronk Pops Show 204: February 4, 2014

Pronk Pops Show 203: February 3, 2014

Pronk Pops Show 202: January 31, 2014

Pronk Pops Show 201: January 30, 2014

Pronk Pops Show 200: January 29, 2014

Pronk Pops Show 199: January 28, 2014

Pronk Pops Show 198: January 27, 2014

Pronk Pops Show 197: January 24, 2014

Pronk Pops Show 196: January 22, 2014

Pronk Pops Show 195: January 21, 2014

Pronk Pops Show 194: January 17, 2014

Pronk Pops Show 193: January 16, 2014

Pronk Pops Show 192: January 14, 2014

Pronk Pops Show 191: January 13, 2014

Pronk Pops Show 190: January 10, 2014

Pronk Pops Show 189: January 9, 2014

Pronk Pops Show 188: January 8, 2014

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Story 1: Nuclear Security Summit 2014 — Loose Nuke War Game — 1 Nuclear Weapon — NYC or Washington? — You Choose — Videos

first-30-cities-to-be-nuked-in-usa

.Wash.DC.nuke

Dr. Strangelove – Precious Bodily Fluids

Dr. Strangelove (1964) – War Room Scene

“Mein Führer…! I can walk!!”

Dr.strangelove ending (good quality)

Obama: ‘The Prospect of a Nuclear Weapon Going Off In Manhattan’

President Obama Speaks at the Nuclear Security Summit

On the Rhodes 3/25/14 – The G7 & Beyond

Nuclear Security Summit 2014

Nuclear Weapons Materials Gone Missing — Nuclear Security Summit Preview 1 of 2

Nuclear Weapons Materials Gone Missing — Nuclear Security Summit Preview 2 of 2

Nuclear Security Summit 2014 in the Hague – Obama & Xi meet

Effects of a Nuclear Bomb Part 1: A Terrorist Nuke Detonates in a City

Effects of a Nuclear Bomb Part 2; Superpower Weapons

Obama and the plan for World War 3

Washington, D.C. gets NUKED! (DAY AFTER DISASTER)

Who’d survive a nuclear attack on D.C.?

Obama’s war games

Nuclear Terrorism and Malaysia Airlines Flight 370 Connection – YouTube

AE 2010: NYC Nuclear Explosion

ATOMIC ATTACK! – New York City Bombed with Nuclear Weapons – How to Survive

Summit goal: Secure “loose nukes”

2012 Young Atlanticist Summit – Conversation with Elizabeth Sherwood-Randall

Fail Safe ending clip

Fail Safe (2000) World Nuclear Holocaust [full movie]

Nuclear Bomb Test Compilation HD

Top 10 Most Powerful Nuclear Bombs In History

 

 

Merkel miffed at Barack Obama and David Cameron ‘nuclear war game’

World leaders played an interactive nuclear war game designed to test their responses to a terrorist atomic “dirty bomb” attack that threatened the lives of hundreds of thousands of people

 

David Cameron joined Barack Obama, Angela Merkel and Xi Jinping and other world leaders to play a “nukes on the loose” war game to see how they would cope with a terrorist nuclear attack.

The German chancellor grumbled at being asked to play games and take tests with the Prime Minister, US and Chinese presidents around a table with dozens of heads of state at a nuclear summit in The Hague.

Her complaints were overruled because Mr Obama was keen on the idea and in on the surprise.

In the war game, played out by actors in a series of short films, a terrorist attack with an atomic “dirty bomb” takes place in the financial heart of an unnamed but Western metropolis. “It could be the City of London, or Wall Street, Milan or anywhere”, summit leaders were told.

As the scenario unfolded, it emerged that the terrorists are from an unidentified global terror network and they have stolen nuclear material from an unidentified country that had poorly secured its radiological and nuclear stockpiles.

The bomb is being built in a clandestine laboratory with stolen uranium. It is an improvised explosive device but deadly and the clock is ticking, the leaders were told. Hundreds of thousands of people could be about to die.

“They had to give an answer on their own, in real time. It was like a test. It put them on the spot. Should they inform the public or keep them in the dark,” said a diplomatic source.

“Should they work with other countries or stand alone to try to thwart or minimise the attack? How should they make the cold calculation of how to get a more sustainable human cost in terms of deaths?”

Each world leader had a computer tablet with a touch screen options to make one of four responses to a series of four scenario films played by actors and mimicking the famous 1983 Cold War Hollywood thriller “War Games”, where a computer hacker triggers a nuclear missile scare.

In a competitive environment, with a ticking clock, the leaders had to make rapid choices before the results were presented to the group, anonymously stripped of their identities and followed by discussion.

Perhaps predictably at a world summit on nuclear security, the war game found that shared, collective international decisions were able to stop the terrorist network before they could actually build the dirty bomb.

US officials said that the unconventional approach had been designed to give a “scare you to death” shock to make leaders seriously think about the security of nuclear materials.

But not everyone was happy about playing the war game with the grumbling led by Mrs Merkel who was unimpressed with role-playing at such a high-powered gathering. Mr Obama, who helped plan the game, overrode the moaning. He had Elizabeth Sherwood-Randall, his lead national security adviser on the issue, helpfully by his side.

“Leaders had their doubts about participation on their own without their expert civil servants. It was about discussion and problem solving without leaders relying on written statements to read out. At the end the leaders were more enthusiastic,” said a spokesman for the summit.

 

Would you survive a nuclear blast?

Nuclear Blast Mapper on the PBS “Race for the Superbomb” web site show how horribly destructive thermonuclear weapons are. The fission bomb detonated over Nagasaki had an explosive power equivalent to 20,000 tons of TNT. Blast Mapper’s 1-million ton hydrogen bomb, hypothetically detonated on the earth’s surface at any location you choose, has 50 times the explosive power of that 1945 explosion. Video clips of actual A-bomb detonations and their effects can also be viewed at: http://www.pbs.org/wgbh/amex/bomb

The adjoining map of the Tri-Cities, Washington, shows circles of destruction from a 1 megaton surface blast centered on Columbia Center mall.

Blast map key

NOTE: Blast pressure within the circles is greater than the indicated values and is less outside the circles. The zones of destruction in the map are broad generalizations and do not take into account factors such as weather and topography. Fatality numbers do not include the significant delayed effects of trauma, fire, or radioactivity.

12 psi (pounds per square inch), Radius: 1.7 miles

At ground zero lies a crater 200 feet deep and 1000 feet in diameter. The rim of the crater is composed of highly radioactive soil and debris. Nothing recognizable remains within about 0.6 mile from the center except, perhaps, the remains of some buildings’ foundations. At 1.7 miles, only some of the strongest buildings — those made of reinforced, poured concrete — are still standing. Ninety-eight percent of the population within this area are dead immediately.

5 psi, radius – 2.7 miles

Virtually everything is destroyed between the 12 and 5 psi circles. The walls of typical multi-story buildings, including apartment buildings, are completely blown out. The bare, structural skeletons of some buildings rise above the debris as you approach the 5 psi circle. Single-family residences within this area are completely blown away — only their foundations remain. Fifty percent of the population between the 12 and 5 psi circles are dead. Forty percent more are injured.

2 psi, radius – 4.7 miles

Any single-family residences that are not completely destroyed are heavily damaged. The windows of office buildings are blown away, as are some of their walls. Everything on these buildings’ upper floors, including the people who were working there, are thrown onto the street. Substantial debris clutters the entire area. Five percent of the population between the 5 and 2 psi circles are dead. Forty-five percent are injured.

1 psi, radius – 7.4 miles

Residences are moderately damaged. Commercial buildings have sustained minimal damage. Twenty-five percent of the population between the 2 and 1 psi circles have been injured, mainly by flying glass and debris. Many others have suffered flash burns from thermal radiation generated by the explosion.

Fallout effects

Radiation effects are for downwind areas.

Assumptions: wind speed – 15 mph, time frame – 7 days

3,000 rem*, distance – 30 miles

Much more than a lethal dose of radiation. Death can occur within hours of exposure. About ten years will need to pass before levels of radioactivity in this area are low enough to be considered safe by U.S. peacetime standards.

900 rem, distance – 90 miles

A lethal dose of radiation. Death occurs from two to fourteen days.

300 rem, distance – 160 miles

Causes extensive internal damage, including harm to nerve cells and the cells that line the digestive tract. Also results in a loss of white blood cells and temporary hair loss.

90 rem, distance – 250 miles

No immediate harmful effects, but does result in a temporary decrease in white blood cells. Two to three years will need to pass before radioactivity levels in this area are low enough to be considered safe by U.S. peacetime standards.

*rem stands for “roentgen equivalent man.” It is a measurement used to quantify the amount of radiation that will produce certain biological effects.

NOTE: This information is drawn mainly from “The Effects of Nuclear War” (Office of Technology Assessment, Congress of the United States, Washington DC, 1979).

http://www.wcpeace.org/nuc_weapons-1.htm

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 222-231

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or DownloadShow 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 230, March 24, 2014, Story 1: Drudge Opts Out of Obamacare and Pays Obamacare Tax Penalty As Small Business Owner — Press Clueless That Small Businesses Are Required To Pay Estimated Taxes Each Quarter in 2014 — CTD — Circling The Drain — Videos

Posted on March 24, 2014. Filed under: American History, Blogroll, Budgetary Policy, Communications, Constitutional Law, Crime, Drugs, Economics, Education, Elections, Employment, Fiscal Policy, Government, Health Care, Health Care Insurance, History, Illegal Immigration, Immigration, Law, Media, Philosophy, Photos, Politics, Regulation, Religion, Scandals, Security, Tax Policy, Terror, Terrorism, Videos, Violence, War, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 230: March 24, 2014

Pronk Pops Show 229: March 21, 2014

Pronk Pops Show 228: March 20, 2014

Pronk Pops Show 227: March 19, 2014

Pronk Pops Show 226: March 18, 2014

Pronk Pops Show 225: March 17, 2014

Pronk Pops Show 224: March 7, 2014

Pronk Pops Show 223: March 6, 2014

Pronk Pops Show 222: March 3, 2014

Pronk Pops Show 221: February 28, 2014

Pronk Pops Show 220: February 27, 2014

Pronk Pops Show 219: February 26, 2014

Pronk Pops Show 218: February 25, 2014

Pronk Pops Show 217: February 24, 2014

Pronk Pops Show 216: February 21, 2014

Pronk Pops Show 215: February 20, 2014

Pronk Pops Show 214: February 19, 2014

Pronk Pops Show 213: February 18, 2014

Pronk Pops Show 212: February 17, 2014

Pronk Pops Show 211: February 14, 2014

Pronk Pops Show 210: February 13, 2014

Pronk Pops Show 209: February 12, 2014

Pronk Pops Show 208: February 11, 2014

Pronk Pops Show 207: February 10, 2014

Pronk Pops Show 206: February 7, 2014

Pronk Pops Show 205: February 5, 2014

Pronk Pops Show 204: February 4, 2014

Pronk Pops Show 203: February 3, 2014

Pronk Pops Show 202: January 31, 2014

Pronk Pops Show 201: January 30, 2014

Pronk Pops Show 200: January 29, 2014

Pronk Pops Show 199: January 28, 2014

Pronk Pops Show 198: January 27, 2014

Pronk Pops Show 197: January 24, 2014

Pronk Pops Show 196: January 22, 2014

Pronk Pops Show 195: January 21, 2014

Pronk Pops Show 194: January 17, 2014

Pronk Pops Show 193: January 16, 2014

Pronk Pops Show 192: January 14, 2014

Pronk Pops Show 191: January 13, 2014

Pronk Pops Show 190: January 10, 2014

Pronk Pops Show 189: January 9, 2014

Pronk Pops Show 188: January 8, 2014

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Story 1: Drudge Opts Out of Obamacare and Pays Obamacare Tax Penalty As Small Business Owner — Press Clueless That Small Businesses Are Required To Pay Estimated Taxes Each Quarter in 2014 — CTD — Circling The Drain — Videos

obamacare-tax

The News Reader

obamacare-mt-rushmoreTaxPenalty 

healthcare-obamacare-penalty-tax-cost-chart

MAP MASTER

he-lied-obamacare-obama-tax-increase-obama-obamacare-politics-1341486707

  obamacare-individual-mandate-tax

Obamacare-Penalty-Amount

heritage-taxes-ocare

obamacare-halloween-white-house

obamacare-cartoon-oct-2013-3obamacare-everyone-hates-political-cartoon

Avoiding ObamaCare Tax

The Lies That Grew Up To Be Obamacare

ObamaCare Lies

WH adviser slams Drudge Report for impact on media

Matt Drudge is right, Estimated Taxes include Obamacare opt-out penalty

eHealth – How Much are the Obamacare Tax Penalties, and When Do They Apply?

Estimated Taxes

Obamacare Penalties: The Big Mistake Millions Are Making

Pay The Obamacare Penalty and Save The Money – Ron Meyer – Stuart Varney – FBN – 8-20-13

Matt Drudge Opts Out of Obamacare ‘For Life’

Opt-out Obamacare penalty actually can’t be enforced unless you get a tax refund (Limbaugh)

ObamaCare Fines, Fees and Expenses Explained pt1

ObamaCare Fines, Fees and Expenses Explained pt2

The Best of George Carlin: Exposing our government and fall of humanity one joke at a time

George Carlin – “I Gave Up On My Species” –

We Are Circling The Drain

Circling The Drain (CTD)

soros_obama

‘LIBERTY TAX’: WHITE HOUSE, MEDIA ATTACK AFTER DRUDGE PAYS OBAMACARE OPT-OUT PENALTY

A White House aide set off a stampede of liberal media criticism for Internet news pioneer Matt Drudge over Obamacare – but his critics don’t seem to understand how small businesses pay taxes.

The brouhaha started when Drudge tweeted, “Just paid the Obamacare penalty for not ‘getting covered’… I’M CALLING IT A LIBERTY TAX.”

Jesse Lee, the Director of Progressive Media at Barack Obama’s White House, respondedthat that was a “Flat lie, no fee for previous year,” adding, “Scary how much influence he once had.”

Lee’s response to Drudge set off a firestorm in the liberal media, with many mainstream media and left-wing reporters countering him on Twitter and in their own articles to claim he does not have to pay Obamacare’s Individual Mandate tax until next year. The individual mandate went into effect Jan. 1 of this year, and most people paying their taxes right now are paying taxes for 2013.

“Dude, there’s no penalty until next yr,” Sahil Kapur of the leftwing Talking Points Memotweeted.

Kapur’s colleague at TPM Dylan Scott wrote a full story with a headline alleging Drudge was “probably lying.”

“Americans don’t pay a penalty for not having health insurance until they file their 2014 taxes — in 2015,” Scott wrote. “So either Drudge is lying or he paid a huge penalty a year earlier than he needed to.”

“Penalty isn’t collected until 2015,” Sam Baker of National Journal tweeted at Drudge.

The Huffington Post’s Jeffrey Young wrote a full article in which he described Drudge’s tweet as “weird” and a “little head-scratching” because the Obamacare tax does not kick in until the 2014 tax year.

Drudge indicated in his followup tweets that since he is self-employed as the proprietor of The Drudge Report, he files as a small business. According to the IRS’s website for self-employed individuals, they are required to pay taxes quarterly.

“As a self-employed individual, generally you are required to file an annual return and pay estimated tax quarterly,” the IRS website reads.

So, when they file and pay those 2014 first quarter taxes, such individuals have to pay the Obamacare Individual Mandate tax if they opted to not have health insurance—like Drudge just did.

Additionally, the IRS form (1040-ES) for estimating quarterly taxes specifically recommends adding the mandate penalty to line 12 for “other taxes” — to pay before the first quarterly deadline of April 15.

“It is true that thousands of small businesses will be forced to pay Obamacare taxes quarterly in 2014,” a Senate Budget Committee aide told Breitbart News on Friday afternoon.

Drudge even indicated as much in followup tweets, but the left-wing reporters—and the White House—have left their criticisms of him intact.

“Dazed team Obama media reporters think Opt-Out tax ‘year away’?” Drudge tweeted. “Not for small businesses that file Qtr estimates. We’re there NOW, baby #pay.”

http://www.breitbart.com/Big-Government/2014/03/21/White-House-Leads-Liberal-Media-In-Matt-Drudge-Attack

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 222-230

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or DownloadShow 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Pronk Pops Show 229, March 21, 2014, Story 1: Surprise There Is Coordination Between Reporters and Politicians — Prescreening of Questions — The Decline and Fall of Investigative Journalism — The Rise of Press Propaganda Big Lies — In The Tank For Obama — Corrupt IRS Scandal Inches Closer To White House and President — Videos

Posted on March 21, 2014. Filed under: American History, Blogroll, Budgetary Policy, Business, Communications, Constitutional Law, Crime, Disasters, Economics, Federal Government, Fiscal Policy, Government, Government Spending, Health Care, Health Care Insurance, History, Law, Media, Philosophy, Photos, Politics, Regulation, Security, Social Science, Tax Policy, Taxes, Technology, United States Constitution, Videos, Wealth, Wisdom | Tags: , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 229: March 21, 2014

Pronk Pops Show 228: March 20, 2014

Pronk Pops Show 227: March 19, 2014

Pronk Pops Show 226: March 18, 2014

Pronk Pops Show 225: March 17, 2014

Pronk Pops Show 224: March 7, 2014

Pronk Pops Show 223: March 6, 2014

Pronk Pops Show 222: March 3, 2014

Pronk Pops Show 221: February 28, 2014

Pronk Pops Show 220: February 27, 2014

Pronk Pops Show 219: February 26, 2014

Pronk Pops Show 218: February 25, 2014

Pronk Pops Show 217: February 24, 2014

Pronk Pops Show 216: February 21, 2014

Pronk Pops Show 215: February 20, 2014

Pronk Pops Show 214: February 19, 2014

Pronk Pops Show 213: February 18, 2014

Pronk Pops Show 212: February 17, 2014

Pronk Pops Show 211: February 14, 2014

Pronk Pops Show 210: February 13, 2014

Pronk Pops Show 209: February 12, 2014

Pronk Pops Show 208: February 11, 2014

Pronk Pops Show 207: February 10, 2014

Pronk Pops Show 206: February 7, 2014

Pronk Pops Show 205: February 5, 2014

Pronk Pops Show 204: February 4, 2014

Pronk Pops Show 203: February 3, 2014

Pronk Pops Show 202: January 31, 2014

Pronk Pops Show 201: January 30, 2014

Pronk Pops Show 200: January 29, 2014

Pronk Pops Show 199: January 28, 2014

Pronk Pops Show 198: January 27, 2014

Pronk Pops Show 197: January 24, 2014

Pronk Pops Show 196: January 22, 2014

Pronk Pops Show 195: January 21, 2014

Pronk Pops Show 194: January 17, 2014

Pronk Pops Show 193: January 16, 2014

Pronk Pops Show 192: January 14, 2014

Pronk Pops Show 191: January 13, 2014

Pronk Pops Show 190: January 10, 2014

Pronk Pops Show 189: January 9, 2014

Pronk Pops Show 188: January 8, 2014

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Story 1: Surprise There Is Coordination Between Reporters and Politicians — Prescreening of Questions — Really — No Kidding — I’m Crusdhed — The Decline and Fall of Investigative Journalism — The Rise of Press Propaganda — In The Tank For Obama — IRS Scandal Pops Up — Videos

irs-scandal

ObamaTyrannyIRSTEAirs-scandal (1)

IRS
IRS-Apology

irs-christy-scandalsfbi_coverupIssa-600

Obama-Scandals

Monty Python’s Fish Tank

LOIS LERNER’S INVOLVEMENT
IN THE
IRS TARGETING OF TAX-EXEMPT ORGANIZATIONS

STAFF REPORT
COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM
U.S. HOUSE OF REPRESENTATIVES
113TH CONGRESS
MARCH 11, 2014

3 Reasons Not To Sweat The “Citizens United” SCOTUS Ruling

Tea Party Activist IRS Targeting Of Conservatives Continues America’s Newsroom

Sekulow IRS Continues To Deceive Americans About IRS Targeting Scandal America’s Newsroom

IRS targeting: Part of long time assault on conservatives

Timeline Of IRS Conservative Targeting

Jun 4 hearing – Al Salvi was targeted by Lois Lerner when she was at the Federal Elections Commission

Brent Bozell On IRS Scandal: ‘Bigger Than Watergate’

Emails Show Lois Lerner’s Motive in IRS Scandal

IRS Scandal Will Justice Be Served Obama Donor Leading Tea Party Targeting Probe

Groups Targeted By IRS Say They Are Finally Hearing From FBI

Trey Gowdy: Lois Lerner “Not Getting Immunity, Period!” • IRS Scandal • 03/04/14 •

Top House Republican: We Already Caught WH Lying About IRS Scandal

Krauthammer: If White House Had Any Connection To IRS Scandal, It Will Be ‘Fatal Problem’ For Obama

Carney: White House Heard Reports, But Didn’t Ask About IRS Scandal

IRS Scandal White House Apppointee Directly Involved

The Obama IRS Targeting Scandal in Five Minutes – Unbelievable Abuse of Power

Rep. Issa: Jay Carney is a ‘paid liar’

6/03/13 Jay Carney responds to being called a paid liar

BOOM! Rep. Issa Has Information That Will Link IRS Scandal Up Into the White House

Fmr. IRS Official Refuses to Testify at Hearing

House CMTE Releases Scathing Report On Lois Lerner’s Involvement In IRS Scandal – Forbes On Fox

Issa Fires Back: Cummings ‘Decided to Have Quite a Hissy Fit’

Justice Dept Denies Request For Special Prosecutor In IRS Scandal – America’s Newsroom

Goldberg on IRS Scandal on IRS

2013 In Review – The Scandals – DOJ, NSA, IRS, Benghazi & The Obama Admin Big Lie – Hannity

Jon Stewart Blasts President: Obama Learns About Scandals by Watching the News?

Sharyl Attkisson: There Is Coordination Between Reporters And Politicians

By Chris Stigall

Chris Stigall talked to former CBS News Reporter Sharyl Attkisson this morning on Talk Radio 1210 WPHT about the trouble reporters have to deal with while covering politicians and the government, as well as the current state of investigative reporting.

Responding to comments regarding a Phoenix television reporter yesterday who initially claimed that the White House pre-screens questions from reporters, Attkisson said, “I wouldn’t surprised if sometimes there is that level of cooperation with some questions. If I need something answered from the White House and they won’t tell me, I’ll call our White House Correspondent. They’re friendlier with the White House Correspondents in general. So the White House Correspondent may ask Jay Carney or one of his folks about an issue and they will be told ‘ask that at the briefing and we’ll answer it.’ They want to answer it in front of everybody. They do know it’s coming and they’ll call on you. There’s that kind of coordination sometimes. I wouldn’t be shocked if there’s sometimes more coordination. I don’t think it’s everybody on every briefing, every day. I’m pretty sure it’s not. But I think people would be surprised at the level of cooperation reporters have in general with politicians.”

Listen to full podcast here…

She also said it is more and more difficult for investigative reporters to get their stories published or on the air because of the trouble it may cause.

“Nobody was interested in the stories. It didn’t seem to matter what the topic was. There’s sort of a problem all over, I talk to my colleagues in different mediums. There’s just a lot of pressure. Investigative reporting gets a lot of backlash. They don’t quite know how to deal with it. Why not just put on stories that don’t draw that kind of response?”

Attkisson also confirmed she’s working on a bookabout how stories are reported in the media.

“I’ve been wanting to write about the unseen influences on the media by coordinated, paid factions, whether they’re from political, corporate or other special interests, the tactics they use to manipulate the images we see, not just in the news but on Facebook, Wikipedia, or fake Twitter accounts. It’s become a way of life and I don’t think the public is aware of how much nearly everything you see today may be influenced, in some fashion, by a paid interest that wants you to think something,” Attkisson said.

http://philadelphia.cbslocal.com/2014/03/21/sharyl-attkisson-there-is-coordination-between-reporters-and-politicians/

Social Welfare Organizations

To be tax-exempt as a social welfare organization described in Internal Revenue Code (IRC) section 501(c)(4), an organization must not be organized for profit and must be operated exclusively to promote social welfare. The earnings of a section 501(c)(4) organization may not inure to the benefit of any private shareholder or individual. If the organization engages in an excess benefit transactionwith a person having substantial influence over the organization, an excise tax may be imposed on the person and any managers agreeing to the transaction. See Introduction to IRC 4958 for more information about this excise tax. For a more detailed discussion of the exemption requirements for section 501(c)(4) organizations, see IRC 501(c)(4) Organizations. For more information about applying for exemption, see Application for Recognition of Exemption.

To be operated exclusively to promote social welfare, an organization must operate primarily to further the common good and general welfare of the people of the community (such as by bringing about civic betterment and social improvements). For example, an organization that restricts the use of its facilities to employees of selected corporations and their guests is primarily benefiting a private group rather than the community and, therefore, does not qualify as a section 501(c)(4) organization. Similarly, an organization formed to represent member-tenants of an apartment complex does not qualify, because its activities benefit the member-tenants and not all tenants in the community, while an organization formed to promote the legal rights of all tenants in a particular community may qualify under section 501(c)(4) as a social welfare organization. An organization is not operated primarily for the promotion of social welfare if its primary activity is operating a social club for the benefit, pleasure or recreation of its members, or is carrying on a business with the general public in a manner similar to organizations operated for profit link].

Seeking legislation germane to the organization’s programs is a permissible means of attaining social welfare purposes. Thus, a section 501(c)(4) social welfare organization may further its exempt purposes through lobbying as its primary activity without jeopardizing its exempt status. An organization that has lost its section 501(c)(3) status due to substantial attempts to influence legislation may not thereafter qualify as a section 501(c)(4) organization. In addition, a section 501(c)(4) organization that engages in lobbying may be required to either provide notice to its members regarding the percentage of dues paid that are applicable to lobbying activities or pay a proxy tax. For more information, see Lobbying Issues .

The promotion of social welfare does not include direct or indirect participation or intervention in political campaigns on behalf of or in opposition to any candidate for public office. However, a section 501(c)(4) social welfare organization may engage in some political activities, so long as that is not its primary activity. However, any expenditure it makes for political activities may be subject to tax under section 527(f). For further information regarding political and lobbying activities of section 501(c) organizations, see Election Year IssuesPolitical Campaign and Lobbying Activities of IRC 501(c)(4), (c)(5), and (c)(6) Organizations, and Revenue Ruling 2004-6.

Additional information

http://www.irs.gov/Charities-&-Non-Profits/Other-Non-Profits/Social-Welfare-Organizations

 

501(c) Organizations

 

501(c) organization, also known colloquially as a 501(c), is an American tax-exempt nonprofit organization. Section 501(c) of the United States Internal Revenue Code (26 U.S.C. § 501(c)) provides that 29 types of nonprofit organizations are exempt from somefederal income taxes. Sections 503 through 505 set out the requirements for attaining such exemptions. Many states refer to Section 501(c) for definitions of organizations exempt from state taxation as well.

The most common type of tax-exempt nonprofit organization falls under category 501(c)(3), whereby a nonprofit organization is exempt from federal income tax if its activities have the following purposes: charitable, religious, educational, scientific, literary, testing for public safety, fostering amateur sports competition, or preventing cruelty to children or animals.

 

 

Types

According to the IRS Publication 557†, in the Organization Reference Chart section, the following is an exact list of 501(c) organization types and their corresponding descriptions.[1]

  • 501(c)(1) — Corporations Organized Under Act of Congress (including Federal Credit Unions)
  • 501(c)(2) — Title Holding Corporation for Exempt Organization[2]
  • 501(c)(3) — Religious, Educational, Charitable, Scientific, Literary, Testing for Public Safety, to Foster National or International Amateur Sports Competition, or Prevention of Cruelty to Children or Animals Organizations
  • 501(c)(4) — Civic Leagues, Social Welfare Organizations, and Local Associations of Employees
  • 501(c)(5) — Labor, Agricultural and Horticultural Organizations
  • 501(c)(6) — Business Leagues, Chambers of Commerce, Real Estate Boards, etc.
  • 501(c)(7) — Social and Recreational Clubs
  • 501(c)(8) — Fraternal Beneficiary Societies and Associations
  • 501(c)(9) — Voluntary Employee Beneficiary Associations
  • 501(c)(10) — Domestic Fraternal Societies and Associations
  • 501(c)(11) — Teachers’ Retirement Fund Associations
  • 501(c)(12) — Benevolent Life Insurance Associations, Mutual Ditch or Irrigation Companies, Mutual or Cooperative Telephone Companies, etc.
  • 501(c)(13) — Cemetery Companies
  • 501(c)(14) — State-Chartered Credit Unions, Mutual Reserve Funds
  • 501(c)(15) — Mutual Insurance Companies or Associations
  • 501(c)(16) — Cooperative Organizations to Finance Crop Operations
  • 501(c)(17) — Supplemental Unemployment Benefit Trusts
  • 501(c)(18) — Employee Funded Pension Trust (created before June 25, 1959)
  • 501(c)(19) — Post or Organization of Past or Present Members of the Armed Forces
  • 501(c)(20) — Group Legal Services Plan Organizations
  • 501(c)(21) — Black lung Benefit Trusts
  • 501(c)(22) — Withdrawal Liability Payment Fund
  • 501(c)(23) — Veterans Organization (created before 1880)
  • 501(c)(24) — Section 4049 ERISA Trusts
  • 501(c)(25) — Title Holding Corporations or Trusts with Multiple Parents
  • 501(c)(26) — State-Sponsored Organization Providing Health Coverage for High-Risk Individuals
  • 501(c)(27) — State-Sponsored Workers’ Compensation Reinsurance Organization
  • 501(c)(28) — National Railroad Retirement Investment Trust
  • 501(c)(29) — Qualified Nonprofit Health Insurance Issuers (Created in section 1322(h)(1) of the Affordable Care Act)[3]

† 501(c)(20) and 501(c)(24) organization types receive little mention in IRS Publication 557 and are not included in its Organization Reference Chart. 501(c)(20) organizations are no longer tax-exempt under Section 501(c)(20) after June 30, 1992, but they may request to become exempt under Section 501(c)(9) effective July 1, 1992.[4] 501(c)(24) organizations are described as Section 4049 ERISA Trusts; Section 4049 of ERISA has been repealed.[5]

Certain day care centers may qualify as tax-exempt under Section 501(k).[6][7][8] The day care center must provide child care away from their homes.[7] At least 85 percent of the children served must be cared for while their parent or guardian is either employed, seeking employment, or a full-time student.[9] Most of the day care center’s funding must come from fees received for day care services.[9] The day care center must also provide child care services to the general public.[7] The tax exemption for certain day care centers was part of the Deficit Reduction Act of 1984.[8]

General compliance issues

Under Section 511, a 501(c) organization is subject to tax on its “unrelated business income“, whether or not the organization actually makes a profit, but not including selling donated merchandise or other business or trade carried on by volunteers, or certain bingo games.[10] Disposal of donated goods valued over $2,500, or acceptance of goods worth over $5,000 may also trigger special filing and record-keeping requirements.

Tax exemption does not excuse an organization from maintaining proper records and filing any required annual or special-purpose tax returns, e.g., 26 U.S.C. § 6033 and 26 U.S.C. § 6050L. Prior to 2008, annual returns were not generally required from an exempt organization accruing less than $25,000 in gross income yearly.[11] However, from 2008 onwards, many such organizations must file a yearly “e-Postcard” known as Form 990-N, or risk losing their exemption, with the maximum accrual being $50,000 to file a 990-N now.[12] Form 990-N must be submitted electronically using an authorized IRS efile provider. Other types of Form 990 may be submitted via mail and some are available electronically through an IRS efile provider. IRS

Failure to file required returns such as Form 990 (Return of Organization Exempt From Income Tax) may result in monetary fines of up to $250,000 per year. Exempt or political organizations (excluding churches or similar religious entities) must make their returns, reports, notices, and exempt applications available for public inspection. The organization’s Form 990 (or similar such public record as the Form 990-EZ or Form 990-PF) is generally available for public inspection and photocopying at the offices of the exempt organization, through a written request and payment for photocopies by mail from the exempt organization, or through a direct Form 4506-A Request for Public Inspection or Copy or Political Organization IRS Form request to the IRS of the exempt organization filing of Form 990 for the past three tax years. The Form 4506-A also allows the public inspection and/or photocopying access to Form 1023 Application for Recognition of Exemption or Form 1024, Form 8871 Political Organization Notice of Section 527 Status, and Form 8872 Political Organization Report of Contribution and Expenditures. Internet access to an organization’s 990 and some other forms are available through information services such as GuideStar.

Failure to file such timely returns and to make other specific information available to the public also is prohibited.[13]

501(c)(3)

501(c)(3) exemptions apply to corporations, and any community chest, fund, cooperating association or foundation, organized and operated exclusively for religiouscharitable,scientific, testing for public safety, literary, or educational purposes, to foster national or international amateur sports competition, or for the prevention of cruelty to children oranimals.[14][15] There are also supporting organizations which are often referred to in shorthand form as “Friends of” organizations.[16][17][18][19][20]

Another provision, 26 U.S.C. § 170, provides a deduction, for federal income tax purposes, for some donors who make charitable contributions to most types of 501(c)(3) organizations, among others. Regulations specify which such deductions must be verifiable to be allowed (e.g., receipts for donations over $250). Due to the tax deductions associated with donations, loss of 501(c)(3) status can be highly challenging to a charity’s continued operation, as many foundations and corporate matching programs do not grant funds to a charity without such status, and individual donors often do not donate to such a charity due to the unavailability of the deduction.

Testing for public safety is described under section 509(a)(4) of the code, which makes the organization a public charity and not a private foundation,[21] but contributions to 509(a)(4) organizations are not deductible by the donor for federal income, estate, or gift tax purposes.

The two exempt classifications of 501(c)(3) organizations are as follows:[22]

public charity, identified by the Internal Revenue Service (IRS) as “not a private foundation”, normally receives a substantial part of its income, directly or indirectly, from the general public or from the government. The public support must be fairly broad, not limited to a few individuals or families. Public charities are defined in the Internal Revenue Code under sections 509(a)(1) through 509(a)(4).

private foundation, sometimes called a non-operating foundation, receives most of its income from investments and endowments. This income is used to make grants to other organizations, rather than being disbursed directly for charitable activities. Private foundations are defined in the Internal Revenue Code under section 509(a) as 501(c)(3) organizations, which do not qualify as public charities.

Churches must meet specific requirements in order to obtain and maintain tax exempt status; these are outlined in IRS Publication 1828: Tax guide for churches and religious organizations.[23] This guide outlines activities allowed and not allowed by churches under the 501(c)(3) designation. A private, nonprofit organization, GuideStar, also provides reputable and detailed results for web-based searching to verify information on 501(c)(3) organizations.[24][better source needed]

Before donating to a 501(c)(3) organization, a donor may wish to consult the searchable online IRS list of charitable organizations[25] as well as lists which may be maintained by a state on a portion of its web portal devoted to its “department of justice” or “office of attorney general”.

Consumers may file IRS Form 13909 with documentation to complain about inappropriate or fraudulent (i.e., fundraising, political campaigning, lobbying) activities by any 501(c)(3) tax-exempt organization.[26]

Obtaining status

The basic requirement of obtaining tax exempt status is that the organization is specifically limited in powers to purposes that the IRS classifies as tax exempt purposes. Unlike for-profit corporations that benefit from broad and general purposes, non profit organizations need to be limited in powers to function with tax exempt status, but a non profit corporation is by default not limited in powers until it specifically limits itself in the articles of incorporation and/or nonprofit corporate bylaws. This limiting of the powers is crucial to obtaining tax exempt status with the IRS and then on the state level.[27] Organizations acquire 501(c)(3) tax exemption by filing IRS Form 1023. The form must be accompanied by a $850 filing fee if the yearly gross receipts for the organization are expected to average $10,000 or more.[28][29] If yearly gross receipts are expected to average less than $10,000, the filing fee is reduced to $400.[28][29] There are some classes of organizations that automatically are treated as tax exempt under 501(c)(3), without the need to file Form 1023:

  • Churches, their integrated auxiliaries, and conventions or associations of churches[30]
  • Organizations that are not private foundations and that have gross receipts that normally are not more than $5,000[31]

The IRS also expects to release a software tool called Cyber Assistant, which will assist with preparation of the application for tax exemption, but as of late 2011 the release date is unclear.[32]

There is an alternative way for an organization to obtain status if an organization has applied for a determination and either there is an actual controversy regarding a determination or the Internal Revenue Service has failed to make a determination. In these cases, the United States Tax Court, the United States District Court for the District of Columbia, and the United States Court of Federal Claims have concurrent jurisdiction to issue a declaratory judgment of the organization’s qualification if the organization has exhausted administrative remedies with the Internal Revenue Service.[33][34]

Political activity

Section 501(c)(3) organizations are prohibited from supporting political candidates, and are subject to limits on lobbying. They risk loss of tax exempt status if these rules are violated.[35][36] An organization that loses its 501(c)(3) status due to being engaged in political activities cannot then qualify for 501(c)(4) status.[37]

Elections

Organizations described in section 501(c)(3) are prohibited from conducting political campaign activities to intervene in elections to public office.[38] The Internal Revenue Service website elaborates upon this prohibition as follows:

Under the Internal Revenue Code, all section 501(c)(3) organizations are absolutely prohibited from directly or indirectly participating in, or intervening in, any political campaign on behalf of (or in opposition to) any candidate for elective public office. Contributions to political campaign funds or public statements of position (verbal or written) made on behalf of the organization in favor of or in opposition to any candidate for public office clearly violate the prohibition against political campaign activity. Violating this prohibition may result in denial or revocation of tax-exempt status and the imposition of certain excise taxes.

Certain activities or expenditures may not be prohibited depending on the facts and circumstances. For example, certain voter education activities (including presenting public forums and publishing voter education guides) conducted in a non-partisan manner do not constitute prohibited political campaign activity. In addition, other activities intended to encourage people to participate in the electoral process, such as voter registration and get-out-the-vote drives, would not be prohibited political campaign activity if conducted in a non-partisan manner.

On the other hand, voter education or registration activities with evidence of bias that

(a) would favor one candidate over another;
(b) oppose a candidate in some manner; or
(c) have the effect of favoring a candidate or group of candidates,

will constitute prohibited participation or intervention.

The Internal Revenue Service provides resources to exempt organizations and the public to help them understand the prohibition. As part of its examination program, the IRS also monitors whether organizations are complying with the prohibition.

Lobbying

In contrast to the prohibition on political campaign interventions by all section 501(c)(3) organizations, public charities (but not private foundations) may conduct a limited amount oflobbying to influence legislation. Although the law states that “No substantial part…” of a public charity’s activities can go to lobbying, charities with large budgets may lawfully expend a million dollars (under the “expenditure” test), or more (under the “substantial part” test) per year on lobbying.[39] To clarify the standard of the “substantial part” test, Congress enacted §501 (h) (called the Conable election after its author, Representative Barber Conable). The section establishes limits based on operating budget that a charity can use to determine if it meets the substantial test. This changes the prohibition against direct intervention in partisan contests only for lobbying. The organization is now presumed in compliance with the substantiality test if they work within the limits. The Conable Election requires a charity to file a declaration with the IRS and file a functional distribution of funds spreadsheet with their Form 990. IRS form 5768[40] is required to make the Conable election.

501(c)(4)

501(c)(4) organizations are generally civic leagues and other corporations operated exclusively for the promotion of “social welfare”, such as civics and civics issues, or local associations of employees with membership limited to a designated company or people in a particular municipality or neighborhood, and with net earnings devoted exclusively to charitable, educational, or recreational purposes.[41] An organization is operated exclusively for the promotion of social welfare if it is primarily engaged in promoting the common good and general welfare of the people of the community.[37][42]

501(c)(4) organizations may inform the public on controversial subjects and attempt to influence legislation relevant to its program[43] and, unlike 501(c)(3) organizations, they may also participate in political campaigns and elections, as long as their primary activity is the promotion of social welfare.[44] The tax exemption for 501(c)(4) organizations applies to most of their operations, but contributions may be subject to gift tax, and income spent on political activities – generally the advocacy of a particular candidate in an election – is taxable.[45] An “action” organization generally qualifies as a 501(c)(4) organization.[46] An “action” organization is one whose activities substantially include, or are exclusively,[47]direct lobbying or grass roots lobbying related to advocacy for or against legislation or proposing, supporting, or opposing legislation that is related to its purpose.[48] A 501(c)(4) organization may directly or indirectly support or oppose a candidate for public office as long as such activities are not a substantial amount of its activities.[37][49]

Contributions to 501(c)(4) organizations are usually not deductible as charitable contributions for U.S. federal income tax, with a few exceptions.[50] Dues or contributions to 501(c)(4) organizations may be deductible as a business expense under IRC 162, although amounts paid for intervention or participation in any political campaign, direct lobbying, grass roots lobbying, and contact with certain federal officials are not deductible.[51] If a 501(c)(4) engages in a substantial amount of these activities, then only the amount of dues or contributions that can be attributed to other activities may be deductible as a business expense.[52] The organization should provide a notice to its members containing a reasonable estimate of the amount related to lobbying and political campaign expenditures, or else the organization is subject to a proxy tax on its lobbying and political campaign expenditures.[51] The organization should also provide an express statement that contributions to the organization are not deductible as charitable contributions during fundraising solicitations.[51]

501(c)(4) organizations are not required to disclose their donors publicly.[53] The lack of disclosure has led to extensive use of the 501(c)(4) provisions for organizations that are actively involved in lobbying, and has become controversial.[54][55] Criticized as “dark money“, spending from these organizations on political TV ads has exceeded spending fromSuper PACs.[56][57]

The origins of 501(c)(4) organizations date back to the Revenue Act of 1913, which created a new group of tax-exempt organizations dedicated to social welfare in a precursor to what is now Internal Revenue Code Section 501(c)(4).[58]

501(c)(5)

501(c)(5) organizations include labor, agricultural and horticultural organizations. Labor unions, county fairs and flower societies are examples of these types of groups. They share a requirement that benefits may not inure to a specific member but the rules for inurement vary among the three different types of organizations under this segment.[59]

501(c)(6)

501(c)(6) organizations include Business Leagues, Home Builders Associations, the Security Industry Association, Chambers of Commerce, Real Estate Boards, and such organizations as the U.S. Chamber of Commerce, the Edison Electric Institute, and the National Football League.

Much like 501(c)(4) groups, there has been some movement toward using 501(c)(6) groups for political purposes. The U.S. Chamber of Commerce is a perennial large spender on politics, and Freedom Partners used 501(c)(6) status to raise and distribute over $250 million to groups during 2012 election campaigns without disclosing its donors.[60] The group’s existence was not publicly known until nearly a year after the election.

Hakanson, Bill (2013). How to Succeed with Nonprofit Trade and Professional AssociationsISBN 1484805747.

http://en.wikipedia.org/wiki/501(c)_organization

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 222-229

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or DownloadShow 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 228, March 20, 2014, Story 1: Presidential Press Secretary Jay Carney Gets Scripted Questions and Provides Written Answers In Advance of Actual Press Conference — Suck Up Journalism — Puppeteer Press — Videos

Posted on March 20, 2014. Filed under: American History, Blogroll, Communications, Employment, History, Media, Philosophy, Photos, Politics, Resources, Scandals, Unemployment, Videos, Wealth, Wisdom | Tags: , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 228: March 20, 2014

Pronk Pops Show 227: March 19, 2014

Pronk Pops Show 226: March 18, 2014

Pronk Pops Show 225: March 17, 2014

Pronk Pops Show 224: March 7, 2014

Pronk Pops Show 223: March 6, 2014

Pronk Pops Show 222: March 3, 2014

Pronk Pops Show 221: February 28, 2014

Pronk Pops Show 220: February 27, 2014

Pronk Pops Show 219: February 26, 2014

Pronk Pops Show 218: February 25, 2014

Pronk Pops Show 217: February 24, 2014

Pronk Pops Show 216: February 21, 2014

Pronk Pops Show 215: February 20, 2014

Pronk Pops Show 214: February 19, 2014

Pronk Pops Show 213: February 18, 2014

Pronk Pops Show 212: February 17, 2014

Pronk Pops Show 211: February 14, 2014

Pronk Pops Show 210: February 13, 2014

Pronk Pops Show 209: February 12, 2014

Pronk Pops Show 208: February 11, 2014

Pronk Pops Show 207: February 10, 2014

Pronk Pops Show 206: February 7, 2014

Pronk Pops Show 205: February 5, 2014

Pronk Pops Show 204: February 4, 2014

Pronk Pops Show 203: February 3, 2014

Pronk Pops Show 202: January 31, 2014

Pronk Pops Show 201: January 30, 2014

Pronk Pops Show 200: January 29, 2014

Pronk Pops Show 199: January 28, 2014

Pronk Pops Show 198: January 27, 2014

Pronk Pops Show 197: January 24, 2014

Pronk Pops Show 196: January 22, 2014

Pronk Pops Show 195: January 21, 2014

Pronk Pops Show 194: January 17, 2014

Pronk Pops Show 193: January 16, 2014

Pronk Pops Show 192: January 14, 2014

Pronk Pops Show 191: January 13, 2014

Pronk Pops Show 190: January 10, 2014

Pronk Pops Show 189: January 9, 2014

Pronk Pops Show 188: January 8, 2014

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Story 1: Presidential Press Secretary Jay Carney Gets Scripted Questions and Provides Written Answers In Advance of Actual Press Conference — Suck Up Journalism — Puppeteer Press — Videos

Soros-puppeteer-Obama

Jay Carney is given Press Briefing Questions in Advance

Obama Local Interview Questions Limited By Countdown Clock, Reporters Told To Stand

Catherine Anaya Montage

Catherine Anaya Youtube Channel

 

Fox News’ Ed Henry Walks Out of White House Briefing After Jay Carney Ignores Him Twice

Jay Carney Denies Charge of Most Secretive White House Ever – 1/26/14 – ABC Interview

Paul Daniels Magic-Philippe Genty Puppeteer

Beautiful performance from Paul Daniels magic show.A puppet casts off his own strings not realising its all that makes him real.French puppeteer Philippe Genty ” In “Pierrot” a marionette determines to liberate himself from the strings that control him. With freedom comes collapse”

‘My mistake and I own up to it’: Phoenix reporter reverses course, says White House Press Secretary Jay Carney DOESN’T get daily briefing questions in advance

By DAVID MARTOSKO, U.S. POLITICAL EDITOR

  • Catherine Anaya of KPHO-TV in Phoenix claimed Carney told reporters that White House correspondents often tell him their questions ahead of time
  • ‘If only this were true,’ Carney told MailOnline
  • Anaya later walked back her story, but said that she was asked to submit a local-news question in writing before Wednesday’s White House briefing
  • She conceded Thursday that she shouldn’t have said the practice is common
  • Anaya also broke protocol by telling viewers about an ‘off the record’ meeting with Carney
  • She said in a statement that she was mistaken about that also, but the statement disappeared from KPHO-TV’s website in less than 30 minutes

White House Press Secretary Jay Carney denied on Thursday a television news reporter’s day-old claim that reporters often ‘provide the questions to him in advance,’ before his daily briefings, and that he sometimes provides answers on paper before taking the podium.

WIthin hours, the Phoenix reporter at the center of a quick-drying controversy admitted she got the whole thing wrong.

Phoenix news anchor Catherine Anaya reported Wednesday night on KPHO-TV5 that in an ‘off the record’ meeting, Carney had told a handful of local TV reporters that White House correspondents often tell him before daily briefings what they’ll be asking.

‘If only this were true,’ Carney told MailOnline Thursday morning.

By mid-afternoon Anaya, fresh of a Washington-to-Phoenix flight, walked parts of her story back in an email to MailOnline. But she insisted that she herself was asked to submit a question in advance for Carney on Wednesday afternoon.

‘As a local journalist I had no issue providing my proposed question in advance,’ she told MailOnline, ‘because I wanted to make sure it was an appropriate q[uestion] for a national briefing and I wanted to make sure it was appropriate for Mr. Carney.’

‘[B]ut in discussing it with a staff member the night before, we decided I would save it for the president. I was attempting to not waste national time on a local question, but in my attempt at explaining that I unintentionally made it sound like that experience applied to everyone.’

‘That is my mistake,’ Anaya added, ‘and I own up to it.’

Meanwhile, KPHO-TV issued a separate statement attributed to Anaya, but the CBS affiliate station quickly deleted it from its website.

Assignment Editor Scott Davis told MailOnline that it ‘apparently … was not the correct statement.’

Anaya’s on-air commentary remains on the website, however.

‘We started here shortly after 8 o’clock with a coffee with Press Secretary Jay Carney inside his office in the West Wing,’ she said on the air, before making a stunning breach of journalistic protocol by reporting on an ‘off the record’ meeting and airing a photo of it.

Published and yanked: The statement KPHO deleted

KPHO-TV issued this extended quote Thursday afternoon from Catherine Anaya, and then quickly withdrew it, saying in an email that ‘apparently that was not the correct statement’:

‘It seems much had been inferred about my observations following my White House visit yesterday.

‘First, I did not take notes during our coffee with Jay Carney because it was off the record. But when I referenced the meeting in my live reports I did say that it was a great opportunity to talk about the challenges of his day and how he has to be so well-versed on many topics each day.

‘In my live report I also wanted to share my impression of my experience in getting a question answered during the briefing. I was indeed asked to provide my question in advance. Because my question was largely of local interest, I chose to save it for my interview with the President instead.

‘My mistake was to lump that experience with my coffee meeting reference, inadvertently giving Mr. Carney credit for that when in fact it did not come from him. I regret giving anyone the impression that it was from conversation I had with Mr. Carney.

I do not attend those briefings regularly and cannot speak directly to the process for non-visiting journalists.

None of my observations stemmed from my off-the-record meeting with Jay Carney.’

‘And this was off-the-record,’ she reported, ‘so we were able to ask him all about some of the preparation that he does on a regular basis for talking to the press in his daily press briefings. He showed us a very long list of items that he has to be well-versed on every single day.’

‘And then he also mentioned that a lot of times,’ Anaya added, ‘unless it’s something breaking, the questions that the reporters actually ask – or the correspondents – they are provided to him in advance.’

‘So then he knows what he’s going to be answering and sometimes those correspondents and reporters also have those answers printed in front of them, because of course it helps when they’re producing their reports for later on.’

Anaya responded to a request for comment hours later. Davis initially told MailOnline that she was on a plane and unavailable.

But the White House was quick to dismiss her account of what Carney said. Carney himself tweeted a second denial after this report was first published.

Anaya’s recounting of her day at the White House aired Wednesday in at least two separate on-air reports. One was uploaded to a hastily created YouTube account and then reported by The Weekly Standard.

It’s unknown who published that video online.

http://www.dailymail.co.uk/news/article-2585306/White-House-Press-Secretary-Jay-Carney-denies-TV-reporters-claim-gets-daily-briefing-questions-IN-ADVANCE.html

Reporter: WH Press Secretary Gets Questions from Reporters Before Press Briefing

A CBS reporter from Arizona reveals that President Obama’s press secretary, Jay Carney, receives questions from the press in advance of his daily press briefing. In fact, she says, the reporters often receive the answers in advance of the briefing, too.

According to the reporter, Jay Carney told her this yesterday at the White House:

It was a very busy day. We started here shortly after 8 o’clock with a coffee with press secretary Jay Carney inside his office in the West Wing,” says the reporter.

“And this was the off-the-record so we were able to ask him all about some of the preparation that he does on a regular basis for talking to the press in his daily press briefings. He showed us a very long list of items that he has to be well versed on every single day.

“And then he also mentioned that a lot of times, unless it’s something breaking, the questions that the reporters actually ask — the correspondents — they are provided to him in advance. So then he knows what he’s going to be answering and sometimes those correspondents and reporters also have those answers printed in front of them, because of course it helps when they’re producing their reports for later on. So that was very interesting.”

The reporter, from a local CBS Arizona affiliate, interviewed President Obama yesterday.

http://www.weeklystandard.com/blogs/reporter-wh-press-secretary-gets-questions-reporters-press-briefing_785607.html

EXCLUSIVE: White House Press Secretary Jay Carney denies TV reporter’s claim that he gets daily briefing questions IN ADVANCE

  • Catherine Anaya of KPHO-TV in Phoenix claims Carney told journalists that White House correspondents often tell him their questions ahead of time
  • ‘If only this were true,’ Carney told MailOnline
  • Anaya broke journalistic protocol by telling viewers about Carney’s alleged habit even though the meeting she attended was ‘off the record’
  • She visited the White House as part of a cattle-call for local TV anchors, who each got four minutes with President Obama

By DAVID MARTOSKO, U.S. POLITICAL EDITOR

White House Press Secretary Jay Carney is denying a television news reporter’s claim that reporters often ‘provide the questions to him in advance,’ before his daily briefings, and that he sometimes provides answers on paper before taking the podium.

‘If only this were true,’ Carney told MailOnline Thursday morning.

He was responding to a claim from KPHO-TV5 anchor Catherine Anaya, who reported Wednesday night on what she called an ‘off the record’ meeting yesterday morning between Carney and a handful of local TV reporters hand-picked to interview President Barack Obama.

SCROLL DOWN FOR VIDEO

‘We started here shortly after 8 o’clock with a coffee with Press Secretary Jay Carney inside his office in the West Wing,’ Anaya said on the air, before making a stunning breach of journalistic protocol by reporting on an ‘off the record’ meeting and airing a photo of it.

‘And this was off-the-record,’ she reported, ‘so we were able to ask him all about some of the preparation that he does on a regular basis for talking to the press in his daily press briefings. He showed us a very long list of items that he has to be well-versed on every single day.’

‘And then he also mentioned that a lot of times,’ Anaya added, ‘unless it’s something breaking, the questions that the reporters actually ask – or the correspondents – they are provided to him in advance.’

A longer broadcast segment, in which Anaya makes the same claim about Carney’s advance knowledge of daily briefing questions, appears on KPHO’s website.

‘They provide the questions to him in advance,’ she said in that report. ‘And so he is already preparing for the answer. And sometimes – in some cases, I should say – he actually prepares that answer for them, so that they can have that to work on their reports later on.’

Anaya also told viewers that she was limited to four minutes for her brief encounter with the president, but ‘stretched it to six.’ At the beginning of KPHO’s video, she’s seen glancing off-camera to see if her time has started.

The interview was conducted with both parties standing up in the White House Diplomatic Room.

‘The reason why we’re standing, I was told by one of his staffers, is because he likes to get comfortable when he’s sitting, and he tends to get very chatty,’ she said.

‘And so this was another way to keep him – and us – at the four minutes that they were suggesting that we not go over.’

‘Yeah,’ responded anchor Adam Longo, ‘and it sounds like the pressure is on when some guy is standing behind him with a countdown clock. That’s a little ridiculous.’

Read more: http://www.dailymail.co.uk/news/article-2585306/White-House-Press-Secretary-Jay-Carney-denies-TV-reporters-claim-gets-daily-briefing-questions-IN-ADVANCE.html#ixzz2wWZbsBb8
Follow us: @MailOnline on Twitter | DailyMail on Facebook

Reporters Held to 4 Minutes With President By Countdown Clock, Looming Aide, and Standing Up

According to a local CBS Arizona affiliate, President Obama and his team have 3 tactics to make sure reporters stick to the 4 minutes the White House has allotted them to interview the leader of the world: a countdown clock, a looming aide, and they have to conduct the interview with the president while standing up.

One CBS anchor called the measures “a little ridiculous.”

“We immediately launched into our interview because there was a person standing behind him actually counting down to the four minutes. And by the time he answered my last question, I realized that we had already gone over the four minutes, so that’s why I took an opportunity to sort of ask a lighter question afterward because I figured at that point, you know, why not? I have nothing to lose,” said the local reporter.

“But what was interesting–a side note–is the reason why we’re standing, I was told by one of his staffers, is because he likes to get comfortable when he’s sitting and he tends to get very chatty. And so this was another way to keep him–and us–at the four minutes that they were suggesting that we not go over.”

Said the local anchor, “Yeah, and it sounds like the pressure is on when some guy is standing behind him with a countdown clock. That’s a little ridiculous.”

President Obama gave a round of interviews to local affiliates yesterday in the White House. Only the CBS Arizona affiliate revealed the process behind the scenes.

White House Reporters: No, Questions Are Not Submitted to Jay Carney in Advance

by Evan McMurry

Currently the banner story at Drudge:

So, what’s up with that? CBS-5′s Catherine Anaya, one of several local reporters who interviewed President Barack Obama on Wednesday, filed a report claiming that White House Press Secretary Jay Carney said questions for press briefings were submitted in advance.

“So he knows what he’s going to be answering,” Anaya said, “and sometimes those correspondents and reporters have those answers printed in front of them, because of course it helps when they’re producing their reports later on.”

The claim was picked up by the Weekly Standard, where it was then mined by the Drudge Report for the siren above.

Members of the White House Press Corps unequivocally denied the story:

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 222-228

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or DownloadShow 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

[youtubehttp://www.youtube.com/watch?v=zw3p2E9gziM]

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 227, March 19, 2014, Story 1: Federal Reserve System To End The Zero Interest Rate Policy in 2015 and Financing Federal Government By Ending Quantitative Easying 3 By Fall of 2014 — No Exit Strategy — Bubbles Bursting — Videos

Posted on March 19, 2014. Filed under: American History, Blogroll, Budgetary Policy, Communications, Constitutional Law, Disasters, Economics, Employment, Federal Government, Fiscal Policy, Government, Government Dependency, Government Spending, Health Care Insurance, History, Housing, Investments, Labor Economics, Law, Media, Monetary Policy, Philosophy, Politics, Regulation, Resources, Social Science, Tax Policy, Unemployment, United States Constitution, Videos, Wealth, Wisdom | Tags: , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 227: March 19, 2014

Pronk Pops Show 226: March 18, 2014

Pronk Pops Show 225: March 17, 2014

Pronk Pops Show 224: March 7, 2014

Pronk Pops Show 223: March 6, 2014

Pronk Pops Show 222: March 3, 2014

Pronk Pops Show 221: February 28, 2014

Pronk Pops Show 220: February 27, 2014

Pronk Pops Show 219: February 26, 2014

Pronk Pops Show 218: February 25, 2014

Pronk Pops Show 217: February 24, 2014

Pronk Pops Show 216: February 21, 2014

Pronk Pops Show 215: February 20, 2014

Pronk Pops Show 214: February 19, 2014

Pronk Pops Show 213: February 18, 2014

Pronk Pops Show 212: February 17, 2014

Pronk Pops Show 211: February 14, 2014

Pronk Pops Show 210: February 13, 2014

Pronk Pops Show 209: February 12, 2014

Pronk Pops Show 208: February 11, 2014

Pronk Pops Show 207: February 10, 2014

Pronk Pops Show 206: February 7, 2014

Pronk Pops Show 205: February 5, 2014

Pronk Pops Show 204: February 4, 2014

Pronk Pops Show 203: February 3, 2014

Pronk Pops Show 202: January 31, 2014

Pronk Pops Show 201: January 30, 2014

Pronk Pops Show 200: January 29, 2014

Pronk Pops Show 199: January 28, 2014

Pronk Pops Show 198: January 27, 2014

Pronk Pops Show 197: January 24, 2014

Pronk Pops Show 196: January 22, 2014

Pronk Pops Show 195: January 21, 2014

Pronk Pops Show 194: January 17, 2014

Pronk Pops Show 193: January 16, 2014

Pronk Pops Show 192: January 14, 2014

Pronk Pops Show 191: January 13, 2014

Pronk Pops Show 190: January 10, 2014

Pronk Pops Show 189: January 9, 2014

Pronk Pops Show 188: January 8, 2014

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Story 1: Federal Reserve System To End The Zero Interest Rate Policy in 2015 and Financing Federal Government By Ending Quantitative Easying 3 By Fall of 2014  — No Exit Strategy — Bubbles Bursting — Videos

janet_yellen

fed-funds-rate-wiki

fed_funds_rate_qe_1_2_3

screen-shot-2014-03-18-at-5-04-49-pm

sp-500-vs-federal-reserve-balance-sheet1

chart-march14

Federal Reserve News Conference

Chair Janet Yellen held a news conference following a meeting of the Federal Reserve’s Open Market Committee.

http://www.c-span.org/video/?318360-1/federal-reserve-news-conference

Press Conference with Chair of the FOMC, Janet L. Yellen

Yellen says Fed will keep short-term interest rates low

Janet Yellen Slip Sinks Dow, But Don’t Overestimate the Comment

Further gradual reduction in Federal Reserve stimulus expected at Yellen led meeting – economy

PROOF The Fed. Is Clueless: Stock Market MELTDOWN Coming. By Gregory Mannarino

Size of the Fed’s Balance Sheet is Concerning

EU European Union Economic Crisis 2013 2014 ; Jim Rickards Economy 2014

Marc Faber Gold, SIlver Won’t Collapse…. Outlook and Analysis

What’s the Deal with Zero Interest Rate Policy? – Laissez Faire Today Exclusive

Economic Meltdown 2014 – Financial Collapse – Gerald Celente – Peter Schiff

Fed’s No. 2 Strongly Backs Low-Rate Policy

Marc Faber: Fed Is ‘Boxed In’ With No Exit Strategy, Won’t End Quantitative Easing

Zero Interest Rate Policy (ZIRP) & Inflation

Talking to Chris Aiello, Managing Director at Dynasty Global Capital in Hong Kong. Chris discusses the zero interest rate policy followed by the Federal Reserve Bank in the United States and the impact on global economy of such a policy.

Michael Covel 001: Zero Interest Rate Policy

Ron Paul Hearing on the Fed’s Manipulation of Interest Rates 9/21/12

Ron Paul ~ The Fed Has Lost Control Of Interest Rates

Milton Friedman on the Failure of Wage and Price Controls

Banking 14: Fed Funds Rate

Banking 15: More on the Fed Funds Rate

Banking 16: Why target rates vs. money supply

Banking 17: What happened to the gold?

Banking 18: Big Picture Discussion

Quantitative Easing — How Does it Work in the Real World?

The video “Quantitative Easing — How Does It Work in the Real World?” explains in detail how the Federal Reserve injects freshly printed money into the real economy and how it may impact the stock market, and your purchasing power. Understanding the QE program and process in detail is extremely important relative to making the best investment decisions possible. Hedge funds, sovereign wealth funds, pension fund, high net worth investors, and alternative asset managers all over the globe will be receiving freshly printed U.S. dollars when they participate in the Fed’s Treasury buying and open market operations related to quantitative easing. Money manager Chris Ciovacco explains how the Fed can inflate the money supply while pushing new dollars into the stock, bond, commodity, currency, gold, silver, and precious metals markets. Understanding the lines of business and clients of the primary QE dealers will give you a rare and detailed insight into quantitative easing , Ben Bernanke, the Federal Reserve, open market operations, and global finance. The educational video, “Quantitative Easing — How Does It Work in the Real World?” was filmed and produced in Atlanta.

Quantitative Easing, the Fed, Finance, and Inflation — QE

The video, “Quantitative Easing (QE), The Federal Reserve, Finance, and Inflation” explains how the Fed “prints money” and who gets the new U.S. dollars. Primary Broker-Dealers, not traditional banks, are involved in the QE process and program. Understanding how QE works enables investors to make better asset allocation and investment decisions or formulate quantitative easing strategies related to wealth preservation and gold. The Fed encourages the Primary Dealers to involve their clients in the bond purchase program, which sheds light on how the printed money gets into the real economy. Chris Ciovacco, of Ciovacco Capital Management provides commentary, insight, and investment analysis as it relates to QE2. The brief educational video, “Quantitative Easing, The Fed, Finance, and Inflation — QE” was filmed in downtown Atlanta.

Quantitative Easing Bernanke — History & Objectives of QE

The video “Quantitative Easing — Ben Bernanke — History and Objectives of QE” gives insight into the Federal Reserve’s perspective of the need to print money in order to stimulate the economy, financial markets, and investing. Writings and comments from Brian Sack and Ben Bernanke are reviewed and analyzed as it relates to inflation, deflation, interest rates, household wealth, mortgage rates, asset prices, investing, money printing, and gold. Bernanke’s “helicopter speech” and “printing press” comments are reviewed in the context of quantitative easing and precious metals, the dollar, gold, and silver. The value of the U.S. dollar, inflation, and purchasing power are covered within the context of an inflation of the money supply via the “printing press”. The brief video “Quantitative Easing Bernanke — History & Objectives of QE” is presented by Chris Ciovacco of Ciovacco Capital Management.

Quantitative Easing (QE) 2010 — 2011 Why is the Fed printing money?

Video explains how the Federal Reserve’s QE program works. Primary broker-dealers, not banks, are the primary recipients of the Fed’s newly printed money. You Tube video explains how the Fed inflates the money supply via a bond purchase program with the NY Fed’s 18 primary dealers. Investment strategies and purchasing power protection can be better understood if investors understand the quantitative easing process and the primary dealer’s lines of business, involvement in global markets, and global client base. Hedge funds, sovereign wealth funds, and high net worth investors all over the globe can participate in the QE 2.0 process. Chris Ciovacco, of Ciovacco Capital Management, explains the possible impacts of the Federal Reserve’s quantitative easing program on the financial markets and your investments. The brief video “Quantitative Easing Explained” or “QE2 Explained” will provide rare insight into the Fed’s balance sheet policies.

Quantitative Easing Explained — Who Gets Fed’s Printed Money?

Video explains how the Federal Reserve’s QE program works. Primary broker-dealers, not banks, are the primary recipients of the Fed’s newly printed money. You Tube video explains how the Fed inflates the money supply via a bond purchase program with the NY Fed’s 18 primary dealers. Investment strategies and purchasing power protection can be better understood if investors understand the quantitative easing process and the primary dealer’s lines of business, involvement in global markets, and global client base. Hedge funds, sovereign wealth funds, and high net worth investors all over the globe can participate in the QE 2.0 process. Chris Ciovacco, of Ciovacco Capital Management, explains the possible impacts of the Federal Reserve’s quantitative easing program on the financial markets and your investments. The brief video “Quantitative Easing Explained” or “QE2 Explained” will provide rare insight into the Fed’s balance sheet policies.

QE2: Quantitative Easing Investing & Stock Market Consequences

Video covers quantitative easing investing and stock market strategies. How gold may be used to protect your purchasing power from QE2. Asset class and investment options are discussed for inflation and deflation, spanning gold, silver, copper, oil, stocks, dividend payers, CDs, utilities, consumer staples, and cash. With the economy and financial markets dealing with inflationary and deflationary forces, flexible investment strategies are needed. Chris Ciovacco, of Ciovacco Capital Management, provides commentary and analysis on QE 2.0, the U.S. Dollar, euro, possible economic and market outcomes related to the Federal Reserve’s program to print money. “Quantitative Easing Investing and Stock Market Consequences” was recorded in Atlanta covering 2010 and 2011 investment strategies.

U.S. Stocks Drop as Fed’s Yellen Outlines Stimulus Exit

By Callie Bost  Mar 19, 2014 3:02 PM CT

U.S. stocks fell for the first time in three days as Federal Reserve Chair Janet Yellen said the central bank’s stimulus program could end this fall and benchmark interest rates could rise six months later.

The S&P 500 slipped 0.6 percent to 1,860.83 at 4 p.m. in New York. The Dow Jones Industrial Average (INDU) slid 113.51 points, or 0.7 percent, to 16,222.68. Trading volume for S&P 500 stocks was in line with the 30-day average at this time of day.

“The pace of tightening, once the Fed starts tightening, is a little bit faster than thought before and I think that’s why we’re getting this market reaction,”John Canally, an economic strategist at LPL Financial Corp., said in a phone interview from Boston. His firm oversees about $438.4 billion. “Being reminded that the Fed will eventually raise rates is getting traders’ attention. We’re still a long way off and there are no signs in the economy about inflation.”

By keeping its benchmark interest-rate target near zero and conducting three rounds of asset purchases, the Fed has helped push the S&P 500 up as much as 178 percent from a 12-year low as U.S. equities enter the sixth year of a bull market that started in March 2009.

Higher Rates

Stocks turned lower today as the Fed’s statement said officials predicted their target interest rate would be 1 percent at the end of 2015 and 2.25 percent a year later, higher than previously forecast, as they upgraded projections for gains in the labor market.

Most Federal Open Market Committee participants reiterated their view that the Fed will refrain from raising the benchmark interest rate until 2015. The median rate among 16 Fed officials rose from December, when they estimated the rate at the end of next year at 0.75 percent, and 1.75 percent for the end of 2016. The central bank said it will look at a wide range of data in determining when to raise its rate from zero, dropping a pledge tying borrowing costs to a 6.5 percent unemployment rate.

Benchmark indexes extended losses as Yellen said the quantitative easing program would end this fall if the Fed continues to taper purchases in measured steps. She sees a “considerable time” between the end of the stimulus and the first rate increase, meaning “six months or that type of thing,” she said at her first press conference following a Fed decision.

‘Risk Factor’

“U.S. indices are moving quickly on Yellen’s comments,” Larry Peruzzi, senior equity trader at Cabrerra Capital Markets LLC in Boston, said in an e-mail. “Equities are adjusting the risk factor of higher rates.”

The S&P 500 advanced 1.7 percent in the last two days as Russia pledged not to seek territory beyond Crimea. The U.S. and Europe are preparing to ratchet up sanctions on Russia after President Vladimir Putin signed an accord setting in motion Crimea’s accession to Russia. With visa bans and asset freezes on Russian officials failing to sway Putin, European Union leaders will meet tomorrow to consider “additional and far-reaching consequences.”

Investors have added $8 billion to U.S. equity exchange-traded funds in the past five days and $1.1 billion to bond ETFs, data compiled by Bloomberg show. Materials stocks absorbed the most money among industry ETFs, taking in $689 million during the past week.

http://www.bloomberg.com/news/2014-03-19/u-s-stock-index-futures-are-little-changed-before-fomc.html

Recap: Janet Yellen’s Press Conference and Fed Decision

Janet Yellen wrapped up her first policy meeting Wednesday as chairwoman of theFederal Reserve, then stepped in front of reporters (and live cameras) for her first press conference.

The new chairwoman had a big job, explaining a major shift in forward guidance for when the central bank might increase rates. In her press conference, she suggested that might be around six months after the Fed ends its bond-buying program.

  • Welcome to another big day in Fed land. Our nation’s central bankers have likely wrapped up their two-day meeting by now. We’re waiting for the Federal Open Market Committee’s policy statement at 2 p.m., along with updated projections from all Fed officials. Then we get Janet Yellen herself half an hour later, at 2:30, for her first press conference.We should have answers to a number of key questions over the next few hours: If the Fed ditches it forward guidance about interest rates, what will replace it? Did Chairwoman Yellen maintain consensus on the committee?  Will she stick around for a couple of hours answering reporters’ questions, like she did with lawmakers?
  • Fun Fed fact, which all you Fed geeks out there surely knew already: Janet Yellen was a driving force behind Fed press conferences.

    As Fed vice chairman, she led a committee shaping the central bank’s overhaul of its communication strategy: the statement, the economic projections, the press conference and more. So if she doesn’t like what she faces in a few hours, she can only blame herself.

    We’ve been doing this for a few years. While you’re waiting, take a trip into our archives for a peek at prior press conferences. It started way back in the days of QE2. long before the word “taper” became the subject of heated dinner-table conversation among economists.

    http://blogs.wsj.com/economics/2014/03/19/live-blog-janet-yellens-press-conference-after-fed-decision/

 

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 222-227

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or DownloadShow 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

[youtubehttp://www.youtube.com/watch?v=zw3p2E9gziM]

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 226, March 18, 2014, Story 1: National Security Agency (NSA) MYSTIC RETRO (“retrospective retrieval”) Tool Can Capture 100% of All Call Conversations in A Country — Videos

Posted on March 18, 2014. Filed under: American History, Blogroll, Communications, Constitutional Law, Crime, Education, Government Spending, History, Law, Philosophy, Photos, Politics, Security, Social Science | Tags: , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 226: March 18, 2014

Pronk Pops Show 225: March 17, 2014

Pronk Pops Show 224: March 7, 2014

Pronk Pops Show 223: March 6, 2014

Pronk Pops Show 222: March 3, 2014

Pronk Pops Show 221: February 28, 2014

Pronk Pops Show 220: February 27, 2014

Pronk Pops Show 219: February 26, 2014

Pronk Pops Show 218: February 25, 2014

Pronk Pops Show 217: February 24, 2014

Pronk Pops Show 216: February 21, 2014

Pronk Pops Show 215: February 20, 2014

Pronk Pops Show 214: February 19, 2014

Pronk Pops Show 213: February 18, 2014

Pronk Pops Show 212: February 17, 2014

Pronk Pops Show 211: February 14, 2014

Pronk Pops Show 210: February 13, 2014

Pronk Pops Show 209: February 12, 2014

Pronk Pops Show 208: February 11, 2014

Pronk Pops Show 207: February 10, 2014

Pronk Pops Show 206: February 7, 2014

Pronk Pops Show 205: February 5, 2014

Pronk Pops Show 204: February 4, 2014

Pronk Pops Show 203: February 3, 2014

Pronk Pops Show 202: January 31, 2014

Pronk Pops Show 201: January 30, 2014

Pronk Pops Show 200: January 29, 2014

Pronk Pops Show 199: January 28, 2014

Pronk Pops Show 198: January 27, 2014

Pronk Pops Show 197: January 24, 2014

Pronk Pops Show 196: January 22, 2014

Pronk Pops Show 195: January 21, 2014

Pronk Pops Show 194: January 17, 2014

Pronk Pops Show 193: January 16, 2014

Pronk Pops Show 192: January 14, 2014

Pronk Pops Show 191: January 13, 2014

Pronk Pops Show 190: January 10, 2014

Pronk Pops Show 189: January 9, 2014

Pronk Pops Show 188: January 8, 2014

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Story 1: National Security Agency (NSA) MYSTIC RETRO (“retrospective retrieval”) Tool Can Capture 100% of All Call Conversations in A Country — Videos

mystic.cover

5 Intriguing Facts about the NSA

How the NSA Spies on Americans (Jim Harper)

Judge Napolitano: Challenges Facing Sen. Paul’s Lawsuit Against NSA

Sen Rand Paul (R KY) Files Lawsuit Against Pres Obama & NSA Mass Surveillance

Rand Paul: My Reaction To Judge Ruling NSA Spying On Americans Illegal

National Security Agency Whistleblower William Binney. NSA Domesic Spying on Americans.

Thomas Drake – Fighting the NSA | London Real

NSA Whistleblower – Jesselyn Radack & Thomas Drake | London Real

NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls

By Barton Gellman and Ashkan Soltani, Tuesday, March 18, 10:37 AM E-mail the writers

The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden.

A senior manager for the program compares it to a time machine — one that can replay the voices from any call without requiring that a person be identified in advance for surveillance.

The voice interception program, called MYSTIC, began in 2009. Its RETRO tool, short for “retrospective retrieval,” and related projects reached full capacity against the first target nation in 2011. Planning documents two years later anticipated similar operations elsewhere.

In the initial deployment, collection systems are recording “every single” conversation nationwide, storing billions of them in a 30-day rolling buffer that clears the oldest calls as new ones arrive, according to a classified summary.

The call buffer opens a door “into the past,” the summary says, enabling users to “retrieve audio of interest that was not tasked at the time of the original call.” Analysts listen to only a fraction of 1 percent of the calls, but the absolute numbers are high. Each month, they send millions of voice clippings, or “cuts,” for processing and long-term storage.

At the request of U.S. officials, The Washington Post is withholding details that could be used to identify the country where the system is being employed or other countries where its use was envisioned.

No other NSA program disclosed to date has swallowed a nation’s telephone network whole. Outside experts have sometimes described that prospect as disquieting but remote, with notable implications for a growing debate over the NSA’s practice of “bulk collection” abroad.

Bulk methods capture massive data flows “without the use of discriminants,” as President Obama put it in January. By design, they vacuum up all the data they touch — meaning that most of the conversations collected by RETRO would be irrelevant to U.S. national security interests.

In the view of U.S. officials, however, the capability is highly valuable.

In a statement, Caitlin Hayden, spokeswoman for the National Security Council, declined to comment on “specific alleged intelligence activities.” Speaking generally, she said “new or emerging threats” are “often hidden within the large and complex system of modern global communications, and the United States must consequently collect signals intelligence in bulk in certain circumstances in order to identify these threats.”

NSA spokeswoman Vanee Vines, in an e-mailed statement, said that “continuous and selective reporting of specific techniques and tools used for legitimate U.S. foreign intelligence activities is highly detrimental to the national security of the United States and of our allies, and places at risk those we are sworn to protect.”

Some of the documents provided by Snowden suggest that high-volume eavesdropping may soon be extended to other countries, if it has not been already. The RETRO tool was built three years ago as a “unique one-off capability,” but last year’s secret intelligence budgetnamed five more countries for which the MYSTIC program provides “comprehensive metadata access and content,” with a sixth expected to be in place by last October.

The budget did not say whether the NSA now records calls in quantity in those countries, or expects to do so. A separate document placed high priority on planning “for MYSTIC accesses against projected new mission requirements,” including “voice.”

Ubiquitous voice surveillance, even overseas, pulls in a great deal of content from Americans who telephone, visit and work in the target country. It may also be seen as inconsistent with Obama’s Jan. 17 pledge “that the United States is not spying on ordinary people who don’t threaten our national security,” regardless of nationality, “and that we take their privacy concerns into account.”

In a presidential policy directive, Obama instructed the NSA and other agencies that bulk acquisition may be used only to gather intelligence on one of six specified threats, including nuclear proliferation and terrorism. The directive, however, also noted that limits on bulk collection “do not apply to signals intelligence data that is temporarily acquired to facilitate targeted collection.”

The emblem of the MYSTIC program depicts a cartoon wizard with a telephone-headed staff. Among the agency’s bulk collection programs disclosed over the past year, its focus on the spoken word is unique. Most of the programs have involved the bulk collection of eithermetadata — which does not include content — or text, such as e-mail address books.

Telephone calls are often thought to be more ephemeral and less suited than text for processing, storage and search. Indeed, there are indications that the call-recording program has been hindered by the NSA’s limited capacity to store and transmit bulky voice files.

In the first year of its deployment, a program officer wrote that the project “has long since reached the point where it was collecting and sending home far more than the bandwidth could handle.”

Because of similar capacity limits across a range of collection programs, the NSA is leaping forward with cloud-based collection systems and a gargantuan new “mission data repository” in Utah. According to its overview briefing, the Utah facility is designed “to cope with the vast increases in digital data that have accompanied the rise of the global network.”

Christopher Soghoian, the principal technologist for the American Civil Liberties Union, said history suggests that “over the next couple of years they will expand to more countries, retain data longer and expand the secondary uses.”

Spokesmen for the NSA and the Office of Director of National Intelligence James R. Clapper Jr. declined to confirm or deny expansion plans or discuss the criteria for any change.

Based on RETRO’s internal reviews, the NSA has strong motive to deploy it elsewhere. In the documents and interviews, U.S. officials said RETRO is uniquely valuable when an analyst first uncovers a new name or telephone number of interest.

With up to 30 days of recorded conversations in hand, the NSA can pull an instant history of the subject’s movements, associates and plans. Some other U.S. intelligence agencies also have access to RETRO.

Highly classified briefings cite examples in which the tool offered high-stakes intelligence that would not have existed under traditional surveillance programs in which subjects were identified for targeting in advance. Unlike most of the government’s public claims about the value of controversial programs, the briefings supply names, dates, locations and fragments of intercepted calls in convincing detail.

Present and former U.S. officials, speaking on the condition of anonymity to provide context for a classified program, acknowledged that large numbers of conversations involving Americans would be gathered from the country where RETRO operates.

The NSA does not attempt to filter out their calls, defining them as communications “acquired incidentally as a result of collection directed against appropriate foreign intelligence targets.”

Until about 20 years ago, such incidental collection was unusual unless an American was communicating directly with a foreign intelligence target. In bulk collection systems, which are exponentially more capable than the ones in use throughout the Cold War, calls and other data from U.S. citizens and permanent residents are regularly ingested by the millions.

Under the NSA’s internal “minimization rules,” those intercepted communications “may be retained and processed” and included in intelligence reports. The agency generally removes the names of U.S. callers, but there are several broadly worded exceptions.

An independent group tasked by the White House to review U.S. surveillance policiesrecommended that incidentally collected U.S. calls and e-mails — including those obtained overseas — should nearly always “be purged upon detection.” Obama did not accept that recommendation.

Vines, in her statement, said the NSA’s work is “strictly conducted under the rule of law.”

RETRO and MYSTIC are carried out under Executive Order 12333, the traditional grant of presidential authority to intelligence agencies for operations outside the United States.

Since August, Sen. Dianne Feinstein (D-Calif.), the chairman of the Senate Intelligence Committee, and others on that panel have been working on plans to assert a greater oversight role for intelligence gathering abroad. Some legislators are now considering whether Congress should also draft new laws to govern those operations.

Experts say there is not much legislation that governs overseas intelligence work.

“Much of the U.S. government’s intelligence collection is not regulated by any statute passed by Congress,” said Timothy H. Edgar, the former director of privacy and civil liberties on Obama’s national security staff. “There’s a lot of focus on the Foreign Intelligence Surveillance Act, which is understandable, but that’s only a slice of what the intelligence community does.”

All surveillance must be properly authorized for a legitimate intelligence purpose, he said, but that “still leaves a gap for activities that otherwise basically aren’t regulated by law because they’re not covered by FISA.”

Beginning in 2007, Congress loosened 40-year-old restrictions on domestic surveillance because so much foreign data crossed U.S. territory. There were no comparable changes to protect the privacy of U.S. citizens and residents whose calls and e-mails now routinely cross international borders.

Vines noted that the NSA’s job is to “identify threats within the large and complex system of modern global communications,” where ordinary people share fiber-optic cables with legitimate intelligence targets.

For Peter Swire, a member of the president’s review group, the fact that Americans and foreigners use the same devices, software and networks calls for greater care to safeguard Americans’ privacy.

“It’s important to have institutional protections so that advanced capabilities used overseas don’t get turned against our democracy at home,” he said.

http://www.washingtonpost.com/world/national-security/nsa-surveillance-program-reaches-into-the-past-to-retrieve-replay-phone-calls/2014/03/18/226d2646-ade9-11e3-a49e-76adc9210f19_story.html

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 222-226

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or DownloadShow 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

[youtubehttp://www.youtube.com/watch?v=zw3p2E9gziM]

Read Full Post | Make a Comment ( None so far )

« Previous Entries

Liked it here?
Why not try sites on the blogroll...