Free Trade

The Pronk Pops Show 970, July 18, 2017, Story 1: Will Trump Challenge The Washington Establishment To Achieve His Promises? You Betcha. Will He Win? Long Shot –A Movement Is Not A Viable Political Party That Can Beat The Democratic Party and Republican Party and Their Allies In The Big Government Bureaucracies, Big Lie Media and The Owner Donor Class — Votes Count — Independence Party???– Videos –Story 2: Replace Republicans With D and F Conservative Review Grades and Scores Root and Branch With Real Conservatives, Classical Liberals and Libertarians Until New Political Party Is Formed and Becomes A Viable Party — Videos

Posted on July 19, 2017. Filed under: American History, Breaking News, Budgetary Policy, Communications, Congress, Constitutional Law, Corruption, Countries, Culture, Defense Spending, Diet, Donald J. Trump, Donald Trump, Economics, Education, Elections, Empires, Employment, Energy, Exercise, Federal Government, Fiscal Policy, Food, Former President Barack Obama, Free Trade, Freedom of Speech, Government, Government Dependency, Government Spending, Health, Health Care, Health Care Insurance, History, House of Representatives, Human, Human Behavior, Independence, Insurance, Labor Economics, Language, Law, Life, Lying, Media, Medicare, Mike Pence, Monetary Policy, News, Philosophy, Photos, Politics, Polls, President Barack Obama, President Trump, Progressives, Radio, Raymond Thomas Pronk, Rule of Law, Scandals, Senate, Social Security, Tax Policy, Trade Policy, Unemployment, United States of America, Videos, Wealth, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 930,  July 18, 2017

Pronk Pops Show 929,  July 17, 2017

Pronk Pops Show 928,  July 13, 2017

Pronk Pops Show 927,  July 12, 2017

Pronk Pops Show 926,  July 11, 2017

Pronk Pops Show 925,  July 10, 2017

Pronk Pops Show 924,  July 6, 2017

Pronk Pops Show 923,  July 5, 2017

Pronk Pops Show 922,  July 3, 2017 

Pronk Pops Show 921,  June 29, 2017

Pronk Pops Show 920,  June 28, 2017

Pronk Pops Show 919,  June 27, 2017

Pronk Pops Show 918,  June 26, 2017 

Pronk Pops Show 917,  June 22, 2017

Pronk Pops Show 916,  June 21, 2017

Pronk Pops Show 915,  June 20, 2017

Pronk Pops Show 914,  June 19, 2017

Pronk Pops Show 913,  June 16, 2017

Pronk Pops Show 912,  June 15, 2017

Pronk Pops Show 911,  June 14, 2017

Pronk Pops Show 910,  June 13, 2017

Pronk Pops Show 909,  June 12, 2017

Pronk Pops Show 908,  June 9, 2017

Pronk Pops Show 907,  June 8, 2017

Pronk Pops Show 906,  June 7, 2017

Pronk Pops Show 905,  June 6, 2017

Pronk Pops Show 904,  June 5, 2017

Pronk Pops Show 903,  June 1, 2017

Pronk Pops Show 902,  May 31, 2017

Pronk Pops Show 901,  May 30, 2017

Pronk Pops Show 900,  May 25, 2017

Pronk Pops Show 899,  May 24, 2017

Pronk Pops Show 898,  May 23, 2017

Pronk Pops Show 897,  May 22, 2017

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Image result for cartoons big government republicans

Image result for cartoons big government republicansImage result for branco cartoons big government republicansImage result for branco cartoons big government republicansImage result for branco cartoons big government republicans failure to repeal obamacareImage result for branco cartoons big government republicans failure to repeal obamacareImage result for branco cartoons big government republicans failure to repeal obamacareImage result for branco cartoons big government republicans failure to repeal obamacare

Thank you from cartoonist A.F. Branco

Thank you for your conservative cartoons and many laughs.

An interview with political cartoonist Antonio F. Branco

Story 1: Will Trump Challenge The Washington Establishment To Achieve His Promises? You Betcha. Will He Win? Long Shot –A Movement Is Not A Viable Political Party That Can Beat The Democratic Party and Republican Party and Their Allies In The Big Government Bureaucracies, Big Lie Media and The Owner Donor Class — Votes Count — Independence Party?? — Videos —

Donald Trump vs The Establishment

How Liberal Is Donald Trump?

Full Show – Republicans Embrace Failing Obamacare, Trump Says Let It Fail

Liberals react to the 2016 Election result exactly the way you expected.

The Donald and butthurt Liberals

Milton Friedman on Classical Liberalism

Milton Friedman: The Two Major Enemies of a Free Society

Milton Friedman schools young Bernie Sanders about poverty

Milton Friedman: Why people refuse to reduce the government size?

The Difference Between Classical Liberals and Libertarians (Steve Davies Part 2)

What Is Libertarianism? – Learn Liberty

What is Classical Liberalism? – Learn Liberty

What Is Libertarianism? – Learn Liberty

The Decline and Triumph of Classical Liberalism (Pt. 1) – Learn Liberty

Classical Liberalism: The Decline and Triumph of Classical Liberalism (Pt. 2) – Learn Liberty

Pat Buchanan: The establishment is in a panic over Trump

The Rise of Conservatism: Crash Course US History #41

The Reagan Revolution: Crash Course US History #43

How the Republican Party went from Lincoln to Trump

From white supremacy to Barack Obama: The history of the Democratic Party

The Inconvenient Truth About the Democratic Party

Bill Whittle – Racism – Democrats and Republicans switch sides?

The history of the racist Democrat party in under 12 minutes by Billy Whittle

Who Are America’s Elites? – Ben Shapiro

456. The Iron Fist of the Ruling Class | Angelo Codevilla

LIMBAUGH: Washington Establishment FEAR Trump SUCCEEDING

Rush Limbaugh: “The Media did not make Donald Trump, and they can’t destroy him”

How Did The U.S. End Up With A Two-Party System?

George Carlin ~ The Ruling Class And What They Own

Story 2: Replace Republicans With D and F Conservative Review Grades and Scores Root and Branch With Real Conservatives, Classical Liberals and Libertarians Until New Political Party Is Formed and Becomes A Viable Party — Videos

Conservative Review: LIBERTY SCORECARD

https://www.conservativereview.com/scorecard

MUST WATCH: President Trump Reacts to GOP Healthcare Bill Collapse – “Let ObamaCare Fail” (FNN)

Sarah Sanders Press Briefing on GOP Healthcare Bill Failure 7/18/17

Richard Epstein: Obamacare’s Collapse, the 2016 Election, & More

“The Classical Liberal Constitution” (featuring the author, Richard Epstein)

The Classical Liberal Constitution

Total Proof Republicans Lied About Repealing Obamacare

Hannity to GOP: Get the job done or get out of Washington

Sen. Paul: The Republican plan kept the death spiral

The Newsroom – Rinos, Real Republicans, The Tea Party, The Founding Fathers on religion and more

Mark Levin Destroys Leftist Democrats And RINO Republicans

Senate Majority Leader Mitch McConnell

KY F 42%

Republican Senate Whip John Cornyn

 

 

 

House Speaker Paul Ryan

House Majority Leader Kevin McCarthy

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 926-930

Listen To Pronk Pops Podcast or Download Shows 916-925

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

 

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 923, July 5, 2017, Story 1: Chinese Communists Need To Replace North Korean Kim Jung Eng To Stop Nuclear Proliferation Or Face Embargo On All Chinese Goods Going To North America and European Union –Neither Diplomatic Nor Military Options Are Viable — Conventional and Nuclear War Are Not Viable Options — Videos — Story 2: Microsoft’s Founder Bill Gates Finally Gets A Clue — Open Borders Mass Migration Is Not In The Interest of Neither The American People Nor The People of Europe — Bad Ideas Have Negative Consequences — What Is Bill Gates Afraid of? — Videos

Posted on July 5, 2017. Filed under: American History, Blogroll, Bombs, Breaking News, Budgetary Policy, Canada, Coal, College, Comedy, Communications, Congress, Constitutional Law, Corruption, Countries, Crime, Cruise Missiles, Culture, Donald J. Trump, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Drones, Economics, Education, Empires, Employment, Federal Government, Fiscal Policy, Foreign Policy, Free Trade, Freedom of Speech, Germany, Government, Government Dependency, Government Spending, Great Britain, History, Homicide, House of Representatives, Human Behavior, Independence, Islamic Republic of Iran, Japan, Language, Law, Lying, Media, MIssiles, National Interest, Natural Gas, Neutron Bomb, North Korea, Nuclear, Nuclear Weapons, Oil, People, Philosophy, Photos, Pistols, Politics, Polls, Progressives, Raymond Thomas Pronk, Regulation, Resources, Rifles, Rule of Law, Senate, South Korea, Success, Tax Policy, Taxation, Taxes, Technology, Trade Policy, Transportation, United Kingdom, United States of America, Videos, Violence, War, Wealth, Weapons, Weapons of Mass Destruction, Wisdom | Tags: , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 923,  July 5, 2017

Pronk Pops Show 922,  July 3, 2017 

Pronk Pops Show 921,  June 29, 2017

Pronk Pops Show 920,  June 28, 2017

Pronk Pops Show 919,  June 27, 2017

Pronk Pops Show 918,  June 26, 2017 

Pronk Pops Show 917,  June 22, 2017

Pronk Pops Show 916,  June 21, 2017

Pronk Pops Show 915,  June 20, 2017

Pronk Pops Show 914,  June 19, 2017

Pronk Pops Show 913,  June 16, 2017

Pronk Pops Show 912,  June 15, 2017

Pronk Pops Show 911,  June 14, 2017

Pronk Pops Show 910,  June 13, 2017

Pronk Pops Show 909,  June 12, 2017

Pronk Pops Show 908,  June 9, 2017

Pronk Pops Show 907,  June 8, 2017

Pronk Pops Show 906,  June 7, 2017

Pronk Pops Show 905,  June 6, 2017

Pronk Pops Show 904,  June 5, 2017

Pronk Pops Show 903,  June 1, 2017

Pronk Pops Show 902,  May 31, 2017

Pronk Pops Show 901,  May 30, 2017

Pronk Pops Show 900,  May 25, 2017

Pronk Pops Show 899,  May 24, 2017

Pronk Pops Show 898,  May 23, 2017

Pronk Pops Show 897,  May 22, 2017

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Image result for cartoons communist china and north koreaImage result for cartoons communist china and north koreaImage result for cartoons open borders and mass migration into europeImage result for cartoons bill gates on mass migrationImage result for cartoons bill gates open borders

Image result for cartoons bill gates open borders

Image result for cartoons bill gates open borders

Image result for cartoons open borders

 Story 1: Chinese Communists Need To Replace North Korean Kim Jung Eng To Stop Nuclear Proliferation In Asia and Middle East Or Face Embargo On All Chinese Goods Going To North America and European Union –Neither Diplomatic Nor Military Options Are Viable — Conventional and Nuclear War Are Not Viable Options — Videos —

Image result for north korea icbmImage result for north korea icbm

Image result for map of north korea japan alaska

Image result for u.s. trade imbalance with china 2016

Image result for u.s. trade imbalance with china

Image result for u.s. trade imbalance with china

 

U.N. Security Council holds emergency meeting after North Korea missile test

How North Korea’s ICBM test has “changed the game”

John Bolton calls for ‘sweeping’ set of sanctions on China

Dr. Sebastian Gorka talks US response to North Korea

A military attack would need to be severe to stop North Korea: Rep. Rooney

US vows to use “military force” against North Korea if needed

Heavy move: US threatens China for trading with North Korea after missile test

THE DEBATE – North Korea Missile Threat: Old problems, new solutions?

U.S. and S. Korea respond to N. Korea’s ICBM test with missiles

North Korea tests ICBM

North Korea launches first successful intercontinental ballistic missile test

  • he current population of China is 1,388,284,755 as of Wednesday, July 5, 2017, based on the latest United Nations estimates.
  • China population is equivalent to 18.47% of the total world population.
  • China ranks number 1 in the list of countries (and dependencies) by population.
  • The population density in China is 148 per Km2 (383 people per mi2).
  • The total land area is 9,390,784 Km2 (3,625,800 sq. miles)
  • 59.1 % of the population is urban (819,767,019 people in 2017)
  • The median age in China is 37.3 years.

http://www.worldometers.info/world-population/china-population/

  • The current population of the Russian Federation is 143,374,281 as of Wednesday, July 5, 2017, based on the latest United Nations estimates.
  • Russia population is equivalent to 1.91% of the total world population.
  • Russia ranks number 9 in the list of countries (and dependencies) by population.
  • The population density in Russia is 9 per Km2 (23 people per mi2).
  • The total land area is 16,299,981 Km2 (6,293,455 sq. miles)
  • 73.2 % of the population is urban (104,883,814 people in 2017)
  • The median age in Russia is 38.9 years.

http://www.worldometers.info/world-population/russia-population/

 

  • The current population of North Korea is 25,406,349 as of Wednesday, July 5, 2017, based on the latest United Nations estimates.
  • North Korea population is equivalent to 0.34% of the total world population.
  • North Korea ranks number 52 in the list of countries (and dependencies) by population.
  • The population density in North Korea is 211 per Km2 (546 people per mi2).
  • The total land area is 120,387 Km2 (46,482 sq. miles)
  • 61.2 % of the population is urban (15,557,359 people in 2017)
  • The median age in North Korea is 34.1 years.

http://www.worldometers.info/world-population/north-korea-population/

  • The current population of the Republic of Korea is 50,706,772 as of Wednesday, July 5, 2017, based on the latest United Nations estimates.
  • South Korea population is equivalent to 0.67% of the total world population.
  • South Korea ranks number 27 in the list of countries (and dependencies) by population.
  • The population density in South Korea is 522 per Km2 (1,351 people per mi2).
  • The total land area is 97,235 Km2 (37,543 sq. miles)
  • 81.9 % of the population is urban (41,511,797 people in 2017)
  • The median age in South Korea is 41.1 years.

http://www.worldometers.info/world-population/south-korea-population/

  • The current population of Japan is 126,041,849 as of Wednesday, July 5, 2017, based on the latest United Nations estimates.
  • Japan population is equivalent to 1.68% of the total world population.
  • Japan ranks number 11 in the list of countries (and dependencies) by population.
  • The population density in Japan is 346 per Km2 (896 people per mi2).
  • The total land area is 364,571 Km2 (140,761 sq. miles)
  • 94.5 % of the population is urban (119,160,931 people in 2017)
  • The median age in Japan is 46.9 years.

http://www.worldometers.info/world-population/japan-population/

  • The current population of the United States of America is 326,491,238 as of Wednesday, July 5, 2017, based on the latest United Nations estimates.
  • The United States population is equivalent to 4.34% of the total world population.
  • The U.S.A. ranks number 3 in the list of countries (and dependencies) by population.
  • The population density in the United States is 36 per Km2 (92 people per mi2).
  • The total land area is 9,155,898 Km2 (3,535,111 sq. miles)
  • 82.9 % of the population is urban (270,683,202 people in 2017)
  • The median age in the United States is 38.1 years.

http://www.worldometers.info/world-population/us-population/

 

Countries in the world by population (2017)

This list includes both countries and dependent territories. Data based on the latest United Nations Population Division estimates.
Click on the name of the country or dependency for current estimates (live population clock), historical data, and projected figures.
See also: World Population 

http://www.worldometers.info/world-population/population-by-country/

 

The world’s 10 biggest economies in 2017

Kayakers take in the last of the day's light as they paddle past a ship anchored off Cape Town, May 1, 2011. REUTERS/Mike Hutchings (SOUTH AFRICA - Tags: IMAGES OF THE DAY SOCIETY) - RTR2LVIK

The US dominates, but other economies are catching up
Image: REUTERS/Mike Hutchings

The economy of the United States is the largest in the world. At $18 trillion, it represents a quarter share of the global economy (24.3%), according to the latest World Bank figures.

Image: World Bank

China follows, with $11 trillion, or 14.8% of the world economy. Japan is in third place with an economy of $4.4 trillion, which represents almost 6% of the world economy.

European countries take the next three places on the list: Germany in fourth position, with a $3.3 trillion economy; the United Kingdom in fifth with $2.9 trillion; and France in sixth with $2.4 trillion.

India is in seventh place with $2 trillion, and Italy in eighth with an economy of over $1.8 trillion.

Ninth place goes to Brazil, with an almost $1.8 trillion economy.

And in 10th is Canada, with an economy of over $1.5 trillion.

The economy of the United States is larger than the combined economies of numbers three to 10 on the list.

 The world's biggest economies

Fastest-growing economy

The US may not dominate for much longer, however.

Although China trails the US by $7 trillion, it’s catching up. China’s economy grew by 6.7% in 2016, compared with America’s 1.6%, according to the IMF.

China has also overtaken India as the fastest-growing large economy. The IMF’s World Economic Outlook estimated China’s economy grew at 6.7% in 2016, compared with India’s 6.6%.

Brazil’s economy has contracted in the last year by 3.5%, the only one in the top 10 to do so.

The chart above shows the world’s 40 biggest economies individually, but grouped by colour into continents.

The Asian bloc clearly has a larger share than anywhere else, representing just over a third (33.84%) of global GDP. That’s compared to North America, which represents just over a quarter, at 27.95%.

Europe comes third with just over one-fifth of global GDP (21.37%).

Together, these three blocs generate more than four-fifths (83.16%) of the world’s total output.

The biggest economies in 2050

new study by PricewaterhouseCooper says that China will be in first place by 2050, because emerging economies will continue to grow faster than advanced ones.

India will rank second, the US will be third, and fourth place is expected to go to Indonesia.

The UK could be down to 10th place by 2050, while France could be out of the top 10 and Italy out of the top 20 as they are overtaken by faster-growing emerging economies such as Mexico, Turkey and Vietnam.

The report also says that the world economy could more than double in size by 2050, far outstripping population growth, due to technology-driven productivity.

 

 

 

Image result for u.s. trade imbalance with china

Image result for u.s. trade imbalance with china

Image result for u.s. trade imbalance with china

 

Demographics

North Korea South Korea
Population 24,851,627 (July 2014 est.) 49,039,986 (July 2014 est.)
Age structure 0-14 years: 21.5% (male 2,709,580/female 2,628,456)
15-24 years: 16.3% (male 2,041,861/female 1,997,413)
25-54 years: 44% (male 5,465,889/female 5,456,850)
55-64 years: 8.6% (male 1,007,667/female 1,127,455)
65 years and over: 9.7% (male 826,175/female 1,590,281) (2014 est.)
0-14 years: 14.1% (male 3,603,943/female 3,328,634)
15-24 years: 13.5% (male 3,515,271/female 3,113,257)
25-54 years: 47.3% (male 11,814,872/female 11,360,962)
55-64 years: 12.4% (male 3,012,051/female 3,081,480)
65 years and over: 12.7% (male 2,570,433/female 3,639,083) (2014 est.)
Median age total: 33.4 years
male: 31.8 years
female: 35 years (2014 est.)
total: 40.2 years
male: 38.7 years
female: 41.6 years (2014 est.)
Population growth rate 0.53% (2014 est.) 0.16% (2014 est.)
Birth rate 14.51 births/1,000 population (2014 est.) 8.26 births/1,000 population (2014 est.)
Death rate 9.18 deaths/1,000 population (2014 est.) 6.63 deaths/1,000 population (2014 est.)
Net migration rate -0.04 migrant(s)/1,000 population (2014 est.) 0 migrant(s)/1,000 population (2014 est.)
Sex ratio at birth: 1.05 male(s)/female
0-14 years: 1.03 male(s)/female
15-24 years: 1.02 male(s)/female
25-54 years: 1 male(s)/female
55-64 years: 0.94 male(s)/female
65 years and over: 0.51 male(s)/female
total population: 0.94 male(s)/female (2014 est.)
at birth: 1.07 male(s)/female
0-14 years: 1.08 male(s)/female
15-24 years: 1.13 male(s)/female
25-54 years: 1.04 male(s)/female
55-64 years: 1 male(s)/female
65 years and over: 0.69 male(s)/female
total population: 1 male(s)/female (2014 est.)
Infant mortality rate total: 24.5 deaths/1,000 live births
male: 27.18 deaths/1,000 live births
female: 21.68 deaths/1,000 live births (2014 est.)
total: 3.93 deaths/1,000 live births
male: 4.13 deaths/1,000 live births
female: 3.73 deaths/1,000 live births (2014 est.)
Life expectancy at birth total population: 69.81 years
male: 65.96 years
female: 73.86 years (2014 est.)
total population: 79.8 years
male: 76.67 years
female: 83.13 years (2014 est.)
Total fertility rate 1.98 children born/woman (2014 est.) 1.25 children born/woman (2014 est.)
HIV/AIDS – adult prevalence rate NA less than 0.1% (2009 est.)
Nationality noun: Korean(s)
adjective: Korean
noun: Korean(s)
adjective: Korean
Ethnic groups racially homogeneous; there is a small Chinese community and a few ethnic Japanese homogeneous (except for about 20,000 Chinese)
HIV/AIDS – people living with HIV/AIDS NA 9,500 (2009 est.)
Religions traditionally Buddhist and Confucianist, some Christian and syncretic Chondogyo (Religion of the Heavenly Way)
note: autonomous religious activities now almost nonexistent; government-sponsored religious groups exist to provide illusion of religious freedom
Christian 31.6% (Protestant 24%, Roman Catholic 7.6%), Buddhist 24.2%, other or unknown 0.9%, none 43.3% (2010 survey)
HIV/AIDS – deaths NA fewer than 500 (2009 est.)
Languages Korean Korean, English (widely taught in junior high and high school)
Literacy definition: age 15 and over can read and write
total population: 100%
male: 100%
female: 100% (2008 est.)
definition: age 15 and over can read and write
total population: 97.9%
male: 99.2%
female: 96.6% (2002)
Education expenditures NA 5% of GDP (2009)
Urbanization urban population: 60.3% of total population (2011)
rate of urbanization: 0.63% annual rate of change (2010-15 est.)
urban population: 83.2% of total population (2011)
rate of urbanization: 0.71% annual rate of change (2010-15 est.)
Drinking water source improved:
urban: 98.9% of population
rural: 96.9% of population
total: 98.1% of population
unimproved:
urban: 1.1% of population
rural: 3.1% of population
total: 1.9% of population (2012 est.)
improved:
urban: 99.7% of population
rural: 87.9% of population
total: 97.8% of population
unimproved:
urban: 0.3% of population
rural: 12.1% of population
total: 2.2% of population (2012 est.)
Sanitation facility access improved:
urban: 87.9% of population
rural: 72.5% of population
total: 81.8% of population
unimproved:
urban: 12.1% of population
rural: 27.5% of population
total: 18.2% of population (2012 est.)
improved:
urban: 100% of population
rural: 100% of population
total: 100% of population0% of population
0% of population
0% of population (2012 est.)
Major cities – population PYONGYANG (capital) 2.843 million (2011) SEOUL (capital) 9.736 million; Busan (Pusan) 3.372 million; Incheon (Inch’on) 2.622 million; Daegu (Taegu) 2.447 million; Daejon (Taejon) 1.538 million; Gwangju (Kwangju) 1.503 million (2011)
Maternal mortality rate 81 deaths/100,000 live births (2010) 16 deaths/100,000 live births (2010)
Physicians density 3.29 physicians/1,000 population (2003) 2.02 physicians/1,000 population (2010)
Hospital bed density 13.2 beds/1,000 population (2002) 10.3 beds/1,000 population (2009)
Obesity – adult prevalence rate 3.9% (2008) 7.7% (2008)
Contraceptive prevalence rate 68.6% (2002) 80%
note: percent of women aged 15-44 (2009)
Dependency ratios total dependency ratio: 44.9 %
youth dependency ratio: 31.1 %
elderly dependency ratio: 13.8 %
potential support ratio: 7.2 (2014 est.)
total dependency ratio: 37.1 %
youth dependency ratio: 19.9 %
elderly dependency ratio: 17.2 %
potential support ratio: 5.8 (2014 est.)

Source: CIA Factbook

http://www.indexmundi.com/factbook/compare/north-korea.south-korea/demographics

 

 

Story 2: Microsoft’s Founder Bill Gates Finally Gets A Clue — Open Borders Mass Migration Is Not In The Interest of Neither The American People Nor The People of Europe — Bad Ideas Have Negative Consequences — What Is Bill Gates Afraid of? — Videos

Bill Gates Admits Trump Is Right, Warns We Will Be Overrun With Migrants Unless… – Hot News

Bill Gates warns open door migration overwhelm Europe || Celebrity TV

Bill Gates: Europe Must Stem The Flow Of Immigrants Before It’s Too Late

Bill Gates Talks Trump

Donald Trump About Europe Migrant Crisis EU Illegal Invader Crisis

Bill Gates pushes Open Borders Agenda at DAVOS

EUROPE IMMIGRATION CRISIS – Illegal Immigrants Push Forward Into Germany & Austria

No more open borders in EU? Migrant issue builds barriers

What Bill Gates is afraid of

Bill Gates Surprised by Eugenics Question

Bill Gates Eugenics Empire Exposed

Bill Gates Monsanto Eugenics

Bill Gates in HUGE borders U-turn: ‘Brussels must make it HARDER for migrants to reach EU’

BILL GATES has made a massive open-borders U-turn and urged Brussels to make it more “difficult” for migrants to reach Europe.

By JOEY MILLAR

He had previously called on countries to take in more migrants but now appears to have completely reversed his view.The Microsoft chief said instead of opening the  borders, Brussels should fix the push-factors at the source by sending more foreign aid.He said: “On the one hand you want to demonstrate generosity and take in refugees, but the more generous you are, the more word gets around about this – which in turn motivates more people to leave Africa.
“[ cannot] take in the huge, massive number of people who are wanting to make their way to Europe.”He said instead the EU must make it “more difficult for Africans to reach the continent via the current transit routes” while also relieving “enormous pressure” by sending foreign aid.
The 61-year-old said it was “phenomenal” German Chancellor  is currently spending 0.7 per cent of the country’s GDP on foreign aid and urged others to follow its example.Last year Mr Gates, who is worth an estimated 60 billion pounds, called on America to open its doors to Syrian migrants.
And he said Germany and Sweden were “to be congratulated” for opening its doors during the migrant crisis.He said the USA “had the capacity” to follow suit, claiming: “The total number of refugees is not a world record.”

Bill Gates migrantsGETTY

Bill Gates called on Europe to open its borders to migrants last year

Bill Gates migrantsGETTY

Last year Bill Gates praised Germany and Sweden’s approach to the migrant crisis

Mr Gates’ warnings came days after Italian interior minister Marco Minniti held emergency talks with his French and German counterparts regarding the migrant crisis.More than 80,000 migrants have already arrived in Italy this year, a rise of nearly one-fifth on the same period last year.

 

 

Bill Gates warns that Germany’s open door policy to migrants will overwhelm Europe and urges leaders to ‘make it more difficult for Africans to reach the continent via current routes’

  • Bill Gates warned of ‘huge’ number of migrants waiting to come to Europe 
  • He said generosity of European leaders will only encourage more to come 
  • 61-year-old said Europe must make it more difficult for people to cross border
  • Instead he suggested spending more money on foreign aid to treat the problem

Bill Gates has warned that European leaders risk deepening the migrant crisis by being too generous to those arriving on the continent.

The Microsoft founder said countries such as Germany will not be able to handle the ‘huge’ numbers of migrants waiting to leave Africa and find a better life overseas.

Instead, the 61-year-old suggested spending more on foreign aid to treat the root causes of migration, while making it more difficult for people to reach the continent.

Bill Gates warned European leaders they will worsen the migrant crisis by being over-generous to those arriving on the continent, and suggested spending more on foreign aid instead

Bill Gates warned European leaders they will worsen the migrant crisis by being over-generous to those arriving on the continent, and suggested spending more on foreign aid instead

Mr Gates said countries such as Germany cannot handle the 'huge' numbers of people wanting to travel to Europe (pictured, migrants arrive in Munich)

Mr Gates said countries such as Germany cannot handle the ‘huge’ numbers of people wanting to travel to Europe (pictured, migrants arrive in Munich)

Speaking in an interview with the German Welt am Sonntag newspaper, with a translation published by Breitbart, he said: ‘On the one hand you want to demonstrate generosity and take in refugees.

‘But the more generous you are, the more word gets around about this — which in turn motivates more people to leave Africa.

‘Germany cannot possibly take in the huge number of people who are wanting to make their way to Europe.’

Mr Gates praised Chancellor Merkel’s commitment to spending 0.7 per cent of GDP on foreign aid as ‘phenomenal’, and asked other European leaders to follow suit.

But he added: ‘Europe must make it more difficult for Africans to reach the continent via the current transit routes.’

His own foundation has spent years and invested hundreds of millions of dollars to fight poverty and disease in Africa.

Mail Online contacted the foundation for comment, but had not received a response at the time of publication.

Mrs Merkel has been heavily criticised for her previous policy of open-door migration which saw 1million people arrive in Germany in a single year.

Chancellor Angela Merkel has been criticised for her previous policy of open-door migration. Italian interior minister Marco Minniti raised the prospect of closing ports to private ships helping migrants ashore earlier this week

It is thought that 82,000 migrants, largely from North Africa, have arrived in Italy since the start of the year, with 2,000 drowning in their efforts to cross

It is thought that 82,000 migrants, largely from North Africa, have arrived in Italy since the start of the year, with 2,000 drowning in their efforts to cross

Video playing bottom right…

At the time conservative European politicians warned that providing migrants with an open door into Europe would make the problem worse.

Mr Gates’ comments came as Italian interior minister Marco Minniti held emergency talks with his French and German counterparts over the migrant crisis.

Mr Minniti has threatened to close Italian ports to privately-funded vessels helping to rescue migrants from ships in the Mediterranean.

He said that other European nations must agree to shoulder some of the burden, or Italy will cut funding to those refusing to help.

An estimated 82,000 migrants have arrived in Italy so far this year, up 19 per cent on previous year, The Telegraph reports.

A German government report which leaked to the Bild newspaper suggests there could be up to 6.6million people trying to get into Europe, including 2.5million waiting to cross from North Africa.

It is thought that 2,000 people have lost their lives making the crossing since the start of the year.

Mr Gates’ comments also came after the G20 Africa Conference which took place in Berlin last month.

The summit aimed to discuss ways to improve economic growth, develop infrastructure, and strengthen private investment across the continent.

Austrian troops lock down border

Austria is sending 750 soldiers to its border with Italy in order to head off and expected influx of migrants.

The troops will join four armoured personnel carriers already stationed at the Alpine Brenner Pass to impose checks on those trying to cross.

The move comes after 82,000 migrants landed on Italian shores in the first six months of this year, and the country’s government demanded that other EU nations share the burden.

Austria is sending 750 troops to its southern border with Italy in order to head off an expected influx of migrants (pictured, riot police face off against protesters over the last time border checks were imposed)

Austria is sending 750 troops to its southern border with Italy in order to head off an expected influx of migrants (pictured, riot police face off against protesters over the last time border checks were imposed)

‘I expect border controls will be introduced very soon,’ Defence Minister Peter Doskozil said on Tuesday.

Both Italy and Austria are members of the European Union’s Schengen open-border zone, but free movement has been jeopardised by the reimposition of controls at many crossings across the bloc since the surge in migrants seen in 2015 and 2016.

There was no immediate comment from Italy or EU officials, but Doskozil’s spokesman said there was no concrete timetable for the new controls.

The spokesman added: ‘We’ll see how the situation in Italy is becoming more acute and we have to be prepared to avoid a situation comparable to summer 2015.’

Armoured vehicles were used by Austrian authorities during the migrant influx of 2015 to block roads and stem the flow, and would be used in a similar way this time around, authorities said.

Meanwhile the 750 troops would be able to descend on the region within 72 hours should the need arise.

The troops will join four armoured vehicles in the areas around Brenner Pass (pictured) and would be used to block roads and impose checks on arrivals

The troops will join four armoured vehicles in the areas around Brenner Pass (pictured) and would be used to block roads and impose checks on arrivals

http://www.dailymail.co.uk/news/article-4665198/Bill-Gates-warns-open-door-migration-overwhelm-Europe.html#ixzz4lzmvTBwo

 

Bill Gates: Europe Will Be Overwhelmed Unless It Stems Flow of Migrants

Microsoft founder Bill Gates has warned that Africa’s population explosion will overwhelm Europe unless the continent makes it more difficult for migrants to reach its shores.

The American billionaire’s comments come as European leaders discuss what to do about the surging number of Africans arriving in Italy each week, with Rome calling for other European Union (EU) nations to open their ports to docking migrants so as to ease pressure on the Mediterranean nation.

In an interview with the German Welt am Sonntag newspaper, Gates said massive population growth in Africa will result in “enormous [migratory] pressure” on Europe unless countries increase overseas development aid payments.

Praising Germany having achieved its commitment to devote 0.7 per cent of GDP to foreign aid as “phenomenal”, the 61-year-old called on “other European nations to follow its example”.

But Gates also spoke of a dilemma caused by ‘the German attitude to refugees’, referring to Chancellor Angela Merkel’s decision to open Europe’s borders to illegal migrants arriving from the third world.

“On the one hand you want to demonstrate generosity and take in refugees, but the more generous you are, the more word gets around about this  — which in turn motivates more people to leave Africa,” Gates told the Sunday newspaper.

“Germany cannot possibly take in the huge, massive number of people who are wanting to make their way to Europe.”

Because of this, Gates stressed that “Europe must make it more difficult for Africans to reach the continent via the current transit routes”.

Italy is demanding that other EU nations open their ports to migrants ferried from Libya as the country struggles to cope with having already received over 80,000 people this year.

Calling for African newcomers to be spread throughout Europe, the Mediterranean nation’s globalist centre-left government insisted that the EU migrant relocation programme  — which is largely limited to people from Eritrea and Syria  — should be expanded to include other nationalities, such as Nigerians.

UN High Commissioner for Refugees, Filippo Grandi, on Saturday decried an “unfolding tragedy” in Italy.

“Without a swift collective action, we can only expect more tragedies at sea,” he declared, noting that around 2,000 migrants have lost their lives on the sea route from Libya to Italy this year.

The Italian diplomat repeated calls for an “urgent distribution system” for incoming migrants and asylum seekers, and “additional legal pathways to admission”.

 

05 July 2017 – 05H40

Bye-bye locals: Europe’s city centres sound alarm

 © AFP / by Daniel Bosque and Michaela Cancela-Kieffer | Barcelona’s picturesque Gothic Quarter has gone from residential district to tourist magnet, as deserted buildings full of history make way for quaint hotels

BARCELONA (AFP) – Memories of the past come flooding back as Manuel Mourelo strolls through Barcelona’s picturesque Gothic Quarter: children playing, fun with the neighbours, traditional bars… But now, “all of that has disappeared.”

Hordes of tourists fill the narrow, winding alleys on guided tours, bike and Segway rides, while residents have deserted buildings full of history to make way for quaint hotels and tourist rentals — an issue that affects popular spots Europe-wide.

Last year, Mourelo himself joined the exodus out of a district he had lived in since 1962 when he came to the Spanish seaside city from Galicia in the northwest.

The flat he had been renting for 25 years was sold to an investor and he was evicted. Having paid 500 euros ($560) a month in rent, he was unable to find anything else affordable in the area.

“They were asking for 1,000, 1,200, 1,500 euros,” says the 76-year-old, his face framed by thick glasses and a bushy moustache.

“This was my village. I had it all here, my friends, my shops, I got married here, my children were born here, and I thought I would die here.

“I feel displaced,” he adds, his eyes welling up.

– ‘Emptying out’ –

According to the city hall, the fixed population in the Gothic district so loved by tourists has dropped from 27,470 residents in 2006 to just 15,624 at the end of 2015.

Now, 63 percent are “floating” residents — tourists or people in short-term lets.

At the same time, according to real-estate website Idealista, rental prices in Ciutat Vella, where the Gothic Quarter is located, have gone from 14.4 to 19 euros per square metre in just two years.

Rising rental prices, noise and crowds jostling for space in the streets and the disappearance of traditional, everyday stores have all contributed to forcing people out for economic reasons… or due to sheer frustration.

The arrival of Airbnb and other such home-renting platforms has only aggravated the problem, locals say.

“We’re not talking about gentrification, about substituting the original population by another more wealthy one,” says Gala Pin, a councillor in Ciutat Vella.

“We’re talking about the historic centre emptying out.”

For sociologist Daniel Sorando, co-author of “First We Take Manhattan,” an essay that analyses the phenomenon in various cities, the trend is towards “urban centres conceived as machines to make money while the working classes are displaced outside.”

– Paris, Amsterdam, London –

The problem also affects cities further afield.

In Paris, concerned residents of the 4th district, where Notre-Dame Cathedral is located, organised a symposium on the “invisible desertification” of city centres in March.

The city hall in the French capital said earlier this year that it had lost 20,000 housing units in five years, partly to tourist rentals.

This contributes to a “rise in prices” and a “drop in the population,” Ian Brossat, in charge of housing for Paris’ city hall, told AFP.

In Amsterdam, meanwhile, the ING bank found that owners could earn 350 euros more per month with seasonal rentals, pushing the prices up, Senne Janssen, author of the study, told AFP.

To try and remedy the situation, Paris, London and Amsterdam want to regulate the duration of rentals and register all flats and houses being used for short-term lets in order to better control them.

In Berlin, people are only allowed to rent out one room in their home since last year, and the whole flat or house if it is a secondary or occasional use pied-a-terre.

– ‘Too few to impact’ –

Barcelona, whose mayor Ada Colau is a former anti-eviction housing activist, has chosen to be even more strict.

The city hall last year imposed a 600,000-euro fine on home rental platforms Airbnb and HomeAway for marketing lodgings that lacked permits to host tourists.

But Airbnb Spain says housing problems existed before.

In Ciutat Vella, for instance, “there is three times more empty accommodation (that is not being rented out) than accommodation ads on Airbnb,” says Spain spokesman Andreu Castellano.

And research in cities like Berlin, Los Angeles, London and Barcelona into occupancy shows that “the amount of accommodation put online for purely professional use (rented out more than 120 days a year) is too low to have an impact,” Airbnb adds.

– ‘Tourism fast food’ –

Hard data on the impact of seasonal rentals on accommodation prices are few and far between, but all experts questioned by AFP said these could worsen the situation in already saturated areas.

Barcelona has been particularly hard hit by a rise in prices as investors are attracted by the profitability of a city that sees some 30 million visitors annually.

Sergi Leiva, of real-estate firm MK Premium, says half of his clients are foreigners, who are looking for a second home or a good investment.

And for those who hold on tight despite the prices, life is far from peaceful with the crowds, noise and lack of convenience stores.

“If the prices don’t throw you out, daily pressure does,” says Marti Cuso, a 27-year-old local activist in Barcelona.

Raised in the district, he is the only one among his friends to still live there.

For Socorro Perez, an expert in human geography, the outcome is “cities without residents, dead districts.”

“Cities transform into ‘clusters’ of entertainment and consumption, into tourism fast food.”

by Daniel Bosque and Michaela Cancela-Kieffer

 

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 916-923

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

 

 

 

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 922, July 3, 2017, Story 1: The Meaning of Independence Day — Videos — Part 2 — Story 2: Majority of American People Want and Deserve A Big, Bold, Bipartisan Tax Reform Cut — The Time Is Now For The Fair Tax Less Version of The FairTax — Trump Should Embrace Real Tax Reform By Becoming Champion of Fair Tax Less If He Wants A Booming Economy Growing At 5% Plus — No Guts — No Glory — Just Do It By Labor Day September 4, 2017 — Make America Great Again — What Good is Dreaming It If You Don’t Actually Do It! — Videos

Posted on July 3, 2017. Filed under: American History, Blogroll, Breaking News, Business, Communications, Constitutional Law, Corruption, Countries, Donald J. Trump, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Education, Elections, Empires, Employment, Federal Government, Free Trade, Freedom of Speech, Government, Government Dependency, Government Spending, History, Human, Human Behavior, Illegal Immigration, Immigration, Independence, Language, Legal Immigration, Life, Lying, Medicare, Mike Pence, People, Philosophy, Photos, Politics, Polls, President Trump, Radio, Raymond Thomas Pronk, Security, Social Security, Taxation, Taxes, Trump Surveillance/Spying, United States of America, Videos, Violence, War, Wealth, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 922,  July 3, 2017 

Pronk Pops Show 921,  June 29, 2017

Pronk Pops Show 920,  June 28, 2017

Pronk Pops Show 919,  June 27, 2017

Pronk Pops Show 918,  June 26, 2017 

Pronk Pops Show 917,  June 22, 2017

Pronk Pops Show 916,  June 21, 2017

Pronk Pops Show 915,  June 20, 2017

Pronk Pops Show 914,  June 19, 2017

Pronk Pops Show 913,  June 16, 2017

Pronk Pops Show 912,  June 15, 2017

Pronk Pops Show 911,  June 14, 2017

Pronk Pops Show 910,  June 13, 2017

Pronk Pops Show 909,  June 12, 2017

Pronk Pops Show 908,  June 9, 2017

Pronk Pops Show 907,  June 8, 2017

Pronk Pops Show 906,  June 7, 2017

Pronk Pops Show 905,  June 6, 2017

Pronk Pops Show 904,  June 5, 2017

Pronk Pops Show 903,  June 1, 2017

Pronk Pops Show 902,  May 31, 2017

Pronk Pops Show 901,  May 30, 2017

Pronk Pops Show 900,  May 25, 2017

Pronk Pops Show 899,  May 24, 2017

Pronk Pops Show 898,  May 23, 2017

Pronk Pops Show 897,  May 22, 2017

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Image result for the meaning of independence dayImage result for cartoons about independence day July 4Image result for the meaning of independence dayImage result for cartoons about independence day July 4

Story 1: The Meaning of Independence Day — Videos

The Meaning of Independence Day

Published on Jun 26, 2008

Dr. Michael Berliner, co-chairman of the Board of Directors of the Ayn Rand Institute, former professor of philosophy and executive director of the Ayn Rand Institute, reminds us of the true meaning of Independence Day.

John Adams – Declaretion of Indipendence (HD – With subtitles)

President Underwood’s Speech – House of Cards Season 3

Frank Underwood Explains Why We Watch

Kevin Spacey Explains Who Frank Underwood Is Talking To

Q8 – Trump – cut entitlements, Social Security, deficit, deliver on promises? bringing back jobs

Milton Friedman – The Free Lunch Myth

2017 – The End of Social Security?

Milton Friedman – FDR and Social Security

Milton Friedman – The Social Security Myth

Milton Friedman – The Great Depression Myth

Milton Friedman: The Rise of Socialism is Absurd

Milton Friedman – Socialism is Force

TAKE IT TO THE LIMITS: Milton Friedman on Libertarianism

Milton Friedman: The Two Major Enemies of a Free Society

Milton Friedman – The Draft – From Compulsory to Voluntary

Milton Friedman – Should Higher Education Be Subsidized?

Thomas Sowell — Dismantling America

The Difference Between Liberal and Conservative

The Passing of The Declaration of Independence – John Adams – HBO

Understanding the Declaration of Independence – 9 Key Concepts Everyone Should Know

History of the 4th of July: Crash Course US History Special

Tea, Taxes, and The American Revolution: Crash Course World History #28

4th of July Zombies – Americans Don’t Know Why We Celebrate Fourth of July!

IN CONGRESS, JULY 4, 1776
The unanimous Declaration of the thirteen united States of America

When in the Course of human events it becomes necessary for one people to dissolve the political bands which have connected them with another and to assume among the powers of the earth, the separate and equal station to which the Laws of Nature and of Nature’s God entitle them, a decent respect to the opinions of mankind requires that they should declare the causes which impel them to the separation.

We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness. — That to secure these rights, Governments are instituted among Men, deriving their just powers from the consent of the governed, — That whenever any Form of Government becomes destructive of these ends, it is the Right of the People to alter or to abolish it, and to institute new Government, laying its foundation on such principles and organizing its powers in such form, as to them shall seem most likely to effect their Safety and Happiness. Prudence, indeed, will dictate that Governments long established should not be changed for light and transient causes; and accordingly all experience hath shewn that mankind are more disposed to suffer, while evils are sufferable than to right themselves by abolishing the forms to which they are accustomed. But when a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security. — Such has been the patient sufferance of these Colonies; and such is now the necessity which constrains them to alter their former Systems of Government. The history of the present King of Great Britain is a history of repeated injuries and usurpations, all having in direct object the establishment of an absolute Tyranny over these States. To prove this, let Facts be submitted to a candid world.

He has refused his Assent to Laws, the most wholesome and necessary for the public good.

He has forbidden his Governors to pass Laws of immediate and pressing importance, unless suspended in their operation till his Assent should be obtained; and when so suspended, he has utterly neglected to attend to them.

He has refused to pass other Laws for the accommodation of large districts of people, unless those people would relinquish the right of Representation in the Legislature, a right inestimable to them and formidable to tyrants only.

He has called together legislative bodies at places unusual, uncomfortable, and distant from the depository of their Public Records, for the sole purpose of fatiguing them into compliance with his measures.

He has dissolved Representative Houses repeatedly, for opposing with manly firmness his invasions on the rights of the people.

He has refused for a long time, after such dissolutions, to cause others to be elected, whereby the Legislative Powers, incapable of Annihilation, have returned to the People at large for their exercise; the State remaining in the mean time exposed to all the dangers of invasion from without, and convulsions within.

He has endeavoured to prevent the population of these States; for that purpose obstructing the Laws for Naturalization of Foreigners; refusing to pass others to encourage their migrations hither, and raising the conditions of new Appropriations of Lands.

He has obstructed the Administration of Justice by refusing his Assent to Laws for establishing Judiciary Powers.

He has made Judges dependent on his Will alone for the tenure of their offices, and the amount and payment of their salaries.

He has erected a multitude of New Offices, and sent hither swarms of Officers to harass our people and eat out their substance.

He has kept among us, in times of peace, Standing Armies without the Consent of our legislatures.

He has affected to render the Military independent of and superior to the Civil Power.

He has combined with others to subject us to a jurisdiction foreign to our constitution, and unacknowledged by our laws; giving his Assent to their Acts of pretended Legislation:

For quartering large bodies of armed troops among us:

For protecting them, by a mock Trial from punishment for any Murders which they should commit on the Inhabitants of these States:

For cutting off our Trade with all parts of the world:

For imposing Taxes on us without our Consent:

For depriving us in many cases, of the benefit of Trial by Jury:

For transporting us beyond Seas to be tried for pretended offences:

For abolishing the free System of English Laws in a neighbouring Province, establishing therein an Arbitrary government, and enlarging its Boundaries so as to render it at once an example and fit instrument for introducing the same absolute rule into these Colonies

For taking away our Charters, abolishing our most valuable Laws and altering fundamentally the Forms of our Governments:

For suspending our own Legislatures, and declaring themselves invested with power to legislate for us in all cases whatsoever.

He has abdicated Government here, by declaring us out of his Protection and waging War against us.

He has plundered our seas, ravaged our coasts, burnt our towns, and destroyed the lives of our people.

He is at this time transporting large Armies of foreign Mercenaries to compleat the works of death, desolation, and tyranny, already begun with circumstances of Cruelty & Perfidy scarcely paralleled in the most barbarous ages, and totally unworthy the Head of a civilized nation.

He has constrained our fellow Citizens taken Captive on the high Seas to bear Arms against their Country, to become the executioners of their friends and Brethren, or to fall themselves by their Hands.

He has excited domestic insurrections amongst us, and has endeavoured to bring on the inhabitants of our frontiers, the merciless Indian Savages whose known rule of warfare, is an undistinguished destruction of all ages, sexes and conditions.

In every stage of these Oppressions We have Petitioned for Redress in the most humble terms: Our repeated Petitions have been answered only by repeated injury. A Prince, whose character is thus marked by every act which may define a Tyrant, is unfit to be the ruler of a free people.

Nor have We been wanting in attentions to our British brethren. We have warned them from time to time of attempts by their legislature to extend an unwarrantable jurisdiction over us. We have reminded them of the circumstances of our emigration and settlement here. We have appealed to their native justice and magnanimity, and we have conjured them by the ties of our common kindred to disavow these usurpations, which would inevitably interrupt our connections and correspondence. They too have been deaf to the voice of justice and of consanguinity. We must, therefore, acquiesce in the necessity, which denounces our Separation, and hold them, as we hold the rest of mankind, Enemies in War, in Peace Friends.

We, therefore, the Representatives of the united States of America, in General Congress, Assembled, appealing to the Supreme Judge of the world for the rectitude of our intentions, do, in the Name, and by Authority of the good People of these Colonies, solemnly publish and declare, That these united Colonies are, and of Right ought to be Free and Independent States, that they are Absolved from all Allegiance to the British Crown, and that all political connection between them and the State of Great Britain, is and ought to be totally dissolved; and that as Free and Independent States, they have full Power to levy War, conclude Peace, contract Alliances, establish Commerce, and to do all other Acts and Things which Independent States may of right do. — And for the support of this Declaration, with a firm reliance on the protection of Divine Providence, we mutually pledge to each other our Lives, our Fortunes, and our sacred Honor.

New Hampshire:
Josiah Bartlett, William Whipple, Matthew Thornton

Massachusetts:
John Hancock, Samuel Adams, John Adams, Robert Treat Paine,Elbridge Gerry

Rhode Island:
Stephen Hopkins, William Ellery

Connecticut:
Roger Sherman, Samuel Huntington, William Williams, Oliver Wolcott

New York:
William Floyd, Philip Livingston, Francis Lewis, Lewis Morris

New Jersey:
Richard Stockton, John Witherspoon, Francis Hopkinson, John Hart, Abraham Clark

Pennsylvania:
Robert Morris, Benjamin Rush, Benjamin Franklin, John Morton,George Clymer, James Smith, George Taylor, James Wilson,George Ross

Delaware:
Caesar Rodney, George Read, Thomas McKean

Maryland:
Samuel Chase, William Paca, Thomas Stone, Charles Carroll of Carrollton

Virginia:
George Wythe, Richard Henry Lee, Thomas Jefferson, Benjamin Harrison, Thomas Nelson, Jr., Francis Lightfoot Lee, Carter Braxton

North Carolina:
William Hooper, Joseph Hewes, John Penn

South Carolina:
Edward Rutledge, Thomas Heyward, Jr., Thomas Lynch, Jr.,Arthur Middleton

Georgia:
Button Gwinnett, Lyman Hall, George Walton

Steve Bannon is right: Donald Trump should raise taxes on the rich

White House chief strategist Steve Bannon has a big idea that, according to Axios, he’s been pushing aggressively within the Trump administration: raising the top income tax rate. He’s reportedly telling his colleagues that the top bracket should “have a 4 in front of it.” (The current top bracket is 39.6 percent, or 43.4 after you include Medicare taxes.)

This would be a big shift for the administration. Its latest tax plan would cut the top rate on non-investment income to 35 percent, or 37.9 percent including Medicare taxes. Earlier plans featured top rates of 33 percent and 25 percent, and would lower the rate for “pass-through” income that owners of certain businesses get from 39.6 percent to a mere 15 percent, inducing a huge amount of tax evasion and cutting average rates for the rich still further.

And while Bannon has always affected a rivalry with wealthy elites, which this latest proposal fits into well, it’s doubtful that the more traditional supply-side conservatives on Trump’s economic team, namely Treasury Secretary Steve Mnuchin and National Economic Council Chair Gary Cohn, will get on board.

But they should. Trump and his team have a tremendous number of goals for tax reform. They want a dramatically lower corporate tax rate (Axios reports that Mnuchin and Cohn “aren’t bluffing when they say they want to slash the corporate tax rate to 15% from the current 35%”) and to let companies deduct all their investments immediately, instead of over time. They want a much bigger standard deduction on the individual side, and some kind of subsidy for child care.

Those are expensive changes, which require substantial pay-fors. One of the biggest that Republicans have proposed is the hugely controversial border adjustment measure, which Walmart, the Koch brothers, and other influential business lobbies are loudly opposing. Another is ending the deductibility of interest for debt, a very worthwhile proposal that is sure to enrage banks that take out massive amounts of debt; Goldman Sachs veteran Mnuchin has said he opposes this shift. On the individual side, eliminating the state and local tax deduction, as the Trump team has proposed, would raise money and reduce a big giveaway to rich people in blue states, but then again, the category “rich people in blue states” includes a lot of GOP donors as well as Trump himself.

And even if all of those controversial changes made it through, they might not be enough to pay for all the cuts that Republicans want.

Giving up on individual income tax rate cuts, and embracing higher rates for top earners, would free up a lot more money for corporate tax cuts. The Congressional Budget Office estimates that raising the brackets for people making more than $400,000 or so by 1 point each would raise about $93 billion over 10 years. For a new top rate of, say, 47 percent, that could mean as much as $650 billion over 10 years, and even more if you’re willing to hit 50 percent or raise taxes on people making under $400,000. Another option would be to do what Hillary Clinton proposed in the campaign and add a 5 percent surcharge to income above a certain threshold, without any deductions allowed; that would further reduce opportunities for tax evasion.

An even more ambitious plan, proposed by economists Alan Viard and Eric Toder and embraced by Sen. Mike Lee (R-UT), would overhaul the way the US taxes investment income. Today profits are taxed through the corporate tax code, and then again when they’re distributed to investors through dividends, or when those investors sell shares for a capital gain. Viard and Toder propose lowering the corporate rate to 15 percent and then taxing investments every year at normal income tax rates, whether or not they’re sold. That would end preferential treatment for investment income in the individual code, and let the individual tax raise quite a bit more money. It would enable a 45 or 47 percent top bracket to raise even more revenue to offset the cost of full expensing and a bigger standard deduction.

Ultimately, the Trump administration has to make a decision about what its goal in tax reform is. If the goal is to cut corporate taxes and encourage investment by companies, then Bannon is right: Top income rates should go up to pay for that. If the goal is to just funnel money to rich people, then they shouldn’t. But the former is a more defensible goal, and a top income rate of 45 or 47 percent would help get us there.

https://www.vox.com/policy-and-politics/2017/7/3/15914750/steve-bannon-trump-tax-rich

 

Part 2 –Story 2: Majority of American People Want and Deserve A Big, Bold, Bipartisan Tax Reform Cut — The Time Is Now For The Fair Tax Less Version of The FairTax — Trump Should Embrace Real Tax Reform By Becoming Champion of Fair Tax Less If He Wants A Booming Economy Growing At 5% Plus — No Guts — No Glory — Just Do It By Labor Day September 4, 2017 — Make America Great Again — What Good is Dreaming It If You Don’t Actually Do It! — Videos

Image result for cartoons trump tax plan

Image result for fairtax

Image result for cartoons trump tax plan

Image result for fairtaxImage result for fair tax nation
Image result for border adjustment tax a bad idea

Corporations paying fewer taxes

Image result for payroll taxes in 2016 social security and medicare disability

Image result for payroll taxes in 2016 social security and medicare disability

Image result for payroll taxes in 2016

Wealthy pay more in taxes than poor

Image result for president trump for fair tax

Trump vs. OECD on tax reform

Watters visits Trump’s alma mater to talk tax reform

Rep. Meadows: Tax reform, health care and infrastructure get done by September

Speaker Ryan Guarantees That Congress Will Get Tax Reform Done In 2017

Speaker Paul Ryan Full Speech on Tax Reform 6-20-17

Ron Paul on Paul Ryan’s tax reform plan

How Trump’s tax reform plan will impact the economy

Donald Trump: Simplify the Tax Code

Donald Trump: I pay as little as possible in taxes

Grover Norquist on Speaker Ryan’s tax reform timeline

Grover Norquist: Expect dramatic tax cuts from Trump

The Pledge: Grover Norquist’s hold on the GOP

FairTax: Fire Up Our Economic Engine (Official HD)

Pence on the Fair Tax

Freedom from the IRS! – FairTax Explained in Details

Millionaire confidence plunges on Trump’s tax reform delays

What’s Up With Trump’s Tax Reform? Myths vs. Facts

The FairTax: It’s Time

Dan Mitchell explains the fair tax

Six Reasons Why the Capital Gains Tax Should Be Abolished

Is America’s Tax System Fair?

Sen. Moran Discusses FairTax Legislation on U.S. Senate Floor

Milton Friedman – Why Tax Reform Is Impossible

Milton Friedman – Is tax reform possible?

What’s Killing the American Dream?

Robert Wolf: Border adjustment not going to happen

Is Donald Trump serious about tax reform?

Sean Spicer: Trump wants to get tax reform right

Will tax reform really happen by August?

Dan Mitchell Discussing GOP Tax Plan and Corporate Rate Reduction

What Tax Reform Could Look Like Under Donald Trump | Squawk Box | CNBC

#Eakinomics – 4 Key Questions on Dynamic Scoring

What is Dynamic Scoring?

Trump Pushes ‘Major Border Tax’ to Keep Jobs in U.S.

Ryan Unexpectedly Joins Forces With Bannon on Border Tax

Kudlow: Freedom Caucus & Trump’s base is opposed to Border Adjustment Tax

Sen. Perdue: Border Adjustment Tax would “shutdown economic growth”

Sen. Tom Cotton: “I have serious concerns” w/ Border Adjustment Tax

Americans Need a Progressive Consumption Tax

Sen. Strange: “I would not” vote for a Border Adjustment Tax

CNBC: Steve Forbes on Border Adjustment Tax – “Don’t Do It” 2.8.17

Meg Whitman: Border Adjustment Tax Will Not Create Jobs | CNBC

Art Laffer: Border tax is a major mistake

Border Tax Fight Is Economists Vs. Everybody Else | Squawk Box | CNBC

Dan Mitchell Discussing GOP Tax Plan and Corporate Rate Reduction

What is a Border Adjustment?

Border Tax: What You Need to Know

Will a border adjustment tax help American businesses?

Will a border adjustment tax kill free trade?

Border adjustment tax political suicide?

Fox Pol:l 73% Want Tax Reform This Year – Cavuto

Could the border tax debate stall tax reform?

Is A Border Adjustment Tax A Good Idea?

Border Adjustment Tax: Trump’s MAGA Ace

President Donald Trump Begins First Week By Meeting With Top Business Leaders | NBC News

Dan Mitchell Fretting about GOP Border-Adjustable Tax Plan

Paul Ryan on why he’s confident about tax reform

1/26/17 Border Adjustment Taxes, Tax Reform & Trade: Panel 1

1/26/17 Border Adjustment Taxes, Tax Reform and Trade: Panel 2 Part 2

Border Tax Adjustment and Corporate Tax Reforms: Panel 1

Border Tax Adjustment and Corporate Tax Reforms: Panel 2

Breaking Down The Republican Plan For A Border Tax | CNBC

McConnell Seeks Revenue-Neutral Tax Reform This Congress

Mnuchin: Three percent growth achievable with tax reform

Can Congress get tax reform done?

Rep. Reed: Tax reform will get done this year

Sen. Shelby Says Fundamental Tax Reform Good for Economy

Harvard Professor: Trump’s Border Tax ‘Misunderstood’

Making Sense Of The 20 Percent Tax Proposal | Morning Joe | MSNBC

Proposed Tax Package A Dramatic Cut Even With A Border Tax?

Treasury Secretary Steve Mnuchin On Tax Reform, Growth, Border Tax, China (Full) | Squawk Box | CNBC

Wilbur Ross On Border Tax: Something Will Be Found To Fill Trillion-Dollar Hole | Squawk Box | CNBC

Honda “Impossible Dream” Commercial

Honda Advert: Impossible Dream II 2010

Lyrics
To dream the impossible dream
To fight the unbeatable foe
To bear with unbearable sorrow
To run where the brave dare not go
To right the unrightable wrong
To love pure and chaste from afar
To try when your arms are too weary
To reach the unreachable star
This is my quest, to follow that star,
No matter how hopeless, no matter how far
To fight for the right without question or cause
To be willing to march into hell for a heavenly cause
And I know if I’ll only be true to this glorious quest
That my heart will lie peaceful and calm when I’m laid to my rest
And the world will be better for this
That one man scorned and covered with scars
Still strove with his last ounce of courage
To fight the unbeatable foe, to reach the unreachable star
Songwriters: Joe Darion / Mitchell Leigh
The Impossible Dream lyrics © Helena Music Company

 

Taxes May Be Certain, but Tax Reform Is Not

Taxes May Be Certain, but Tax Reform Is Not
by V. Lance Tarrance

Donald Trump is a man who throws down gauntlets, and he threw down several big ones during his campaign for president — confronting the status quos on immigration, onhealthcare and on taxes, to name a few. He is now pursuing bold policy changes on each. But it could be Trump’s action on taxes that matters most to whether the stock market continues to ride high, GDP growth returns to a healthy 3% and, therefore, whether his presidency is judged well in posterity.

News about taxes has been relatively slow thus far in Trump’s administration. Judicial blowback against his immigration policies and Congressional blowback on healthcare reform have received far more attention than the general tax-plan principles he announced in April. Still, achieving detailed tax reform may prove even more difficult than his other policy struggles once the wheels start turning.

Before making tax reform a year-end goal, Treasury Secretary Steven Mnuchin initially said he hoped to complete tax reform by August. Senate Majority Leader Mitch McConnell reacted by saying that tax reform is a “very complicated subject” and harder to do now than the last time Congress achieved it in 1986. And passing the 1986 tax reform legislation was no easy task — it required winning the support of a Democratic House and a Republican president, and took nearly two years of intense negotiations. Alluding more cynically to the significant political obstacles that often impede changing the tax code, former House Speaker John Boehner said the passing of a tax code overhaul is “just a bunch of happy talk.”

Now, however, current Speaker Paul Ryan is also pushing for tax reform by the end of 2017, making these obstacles appear a little less daunting than if the administration were going it alone.

Aside from whether tax experts and Washington politicians are willing to upend the tax code, it is important to note where the American people stand on the need for action on taxes. It must be remembered that taxpayers may dislike the current tax system but not be convinced that Congress and the Trump administration will make it any better — change could be worse. Without a strong push from the American people, Trump’s tax reform might not materialize.

During the 2016 presidential campaign, Gallup tested several of candidate Trump’s tax proposals.

  • He advocated eliminating most federal income tax deductions and loopholes for the very rich, and Gallup found 63% of American adults favoring this with just 17% opposed.
  • His proposal to simplify the federal tax code — reducing the current seven tax brackets to four — was also popular, with 47% agreeing and only 12% disagreeing.
  • Trump’s plan to eliminate the estate tax paid when someone dies garnered considerably more agreement than disagreement from Americans, 54% to 19%. Notably, this is an issue that Congress and the wider public have considered in the recent past, and public sentiment on the issue today is in line with past Gallup polls on this issue, such as when it asked about keeping the estate tax from increasing in 2010.

More recently, in March 2017, Americans viewed President Trump’s general plan to “significantly cut federal income taxes for the middle class” positively: 61% agreed with the plan (with no mention of Trump in the question), 26% disagreed and 13% had no opinion. Trump’s proposal to lower corporate tax rates, however, elicited a split decision, with 38% reacting positively, 43% negatively and the potentially decisive 19% “no opinion” group apparently needing more information.

These findings suggest Americans could respond favorably to many of the specific elements of Trump’s ultimate tax plan, provided they make it into whatever legislation Congress winds up debating. For example, in spite of closing tax loopholes that favor the rich, the plan is expected to end up cutting taxes on the wealthy, not raising them. But as long as the plan also cuts taxes on the middle class, that fact alone is unlikely to sink it with Americans. Bush’s across-the-board tax cuts in 2001, which more Americans at the time said were a “good thing” than a “bad thing,” are a perfect illustration of this.

Whether Americans feel a sense of urgency about enacting tax reform is another matter.

In April 2017, Gallup found that Americans’ concern about their own federal tax burden had actually cooled somewhat, as barely half (51%) felt their taxes were “too high,” down from 57% in 2016. By contrast, in June 1985, the year before the revolutionary Tax Reform Act of 1986 went into effect, 63% of Americans said their taxes were too high.

While public demand for lowering taxes may have waned, it is not gone. Public concern about taxes fell the most over the past year among Republicans — a familiar political pattern given the partisan shift in presidential power. With a Republican in the White House, the Republican rank and file are less likely to say anything negative about the government, including about taxes. Still, 62% of Republicans call their taxes too high, as do 52% of independents and 39% of Democrats.

The implication? While not as intense as Congressional leaders may have expected, public demand for tax reform is still there, especially among the Republicans who may matter most to GOP lawmakers.

Common Ground Exists on Tax Reform

As the U.S. Congress is about to start its summer recess, tax reform remains ill defined by the administration, and negotiations over sub-issues like the border adjustment tax have stalled any pivot to immediate tax legislation. More importantly, there seems to be no bipartisan support this time, while there was under Reagan in 1986. Granted, this may seem like less of an issue now, as Republicans today control both the legislative and executive branches of the federal government. But real tax reform always makes for winners and losers, and it is problematic for only one party to pass new reforms. One need only look at the electoral consequences that Democrats have repeatedly suffered since 2010, the year they passed major healthcare reform legislation on party-line votes, to understand the danger Republicans could face if they pursue tax reform alone.

To make tax reform possible from a bipartisan standpoint, Congress needs to make sure the bill can be branded a “middle-class winner.” As noted previously, Americans favor tax cuts for the middle class, and as the following table shows, Republicans and Democrats are also more likely to believe middle-income people are currently paying too much in taxes than to say they are paying their fair share or paying too little.

Both Party Groups Tend to Believe Middle-Income Americans Pay Too Much in Federal Taxes
Republican/Lean Republican Democrat/Lean Democratic
% %
Too much 51 49
Fair share 40 43
Too little 5 7
No opinion 4 1
GALLUP, APRIL 5-9, 2017

To ensure tax reform enjoys at least some bipartisan support, Democrats will need a win during negotiations, meaning taxes would likely need to be raised on the nation’s wealthier class of citizens. Republicans are split on the issue of the fairness of taxes paid by upper-income people, but Democrats are in solid agreement that they pay too little.

Parties Diverge on Perceptions of What Upper-Income Americans Pay in Federal Taxes
Republican/Lean Republican Democrat/Lean Democratic
% %
Too much 18 4
Fair share 38 13
Too little 40 82
No opinion 4 1
GALLUP, APRIL 5-9, 2017

Bottom Line

With the Trump administration wanting tax reform before the end of 2017, Ryan is now promising to put it on the front burner. However, even Republican leaders’ enthusiasm for tax reform may not be enough to overcome the triad of legislative challenges that exist: the slimness of the Republican majorities in the U.S. House and Senate, the lack of bipartisanship in Washington and the power of special interest groups in Washington, D.C., to protect their vested interests. This is why comprehensive tax reform is historically so rare.

One thing working in Republicans’ favor is that a majority of Americans support tax relief for the middle class, and members of both major parties tend to believe middle-class taxes are too high. If the bill can be positioned strongly as middle-class tax relief, its chances for success will be higher.

http://www.gallup.com/opinion/polling-matters/213239/taxes-may-certain-tax-reform-not.aspx

The Fair Tax — A Tax System that Americans Rightfully Deserve

  • 04/22/2016
  • FAIRtax 
  • by: Rep. John Ratcliffe (TX-4)
The Fair Tax — A Tax System that Americans Rightfully Deserve

At more than 73,000 pages, it’s no wonder our country’s tax code spells headache for millions of hardworking Americans across the country. This bloated document, riddled with complicated loopholes, is anything but navigable for working-class people who can’t afford to hire accountants, lawyers or tax professionals. Yet like clockwork every spring, Americans throw away countless time and treasure in an attempt to properly comply with the process of giving their hard-earned money to the federal government.

The rigors of compliance aside, our tax code penalizes economic growth and American competitiveness. By imposing some of the highest corporate tax rates in the industrialized world, American business are incentivized to entertain corporate inversions, and leave trillions of dollars of cash abroad where it can’t be invested in American growth. While the well-to-do and well-connected may be able to navigate this byzantine world, taxpayers across the country and throughout the 18 counties in Texas I represent are frustrated, and rightfully so. The American people deserve better.

Frustration with the IRS reached new levels in 2013 when revelations surfaced that the agency was targeting conservative groups. When Congress launched investigations, IRS Commissioner John Koskinen repeatedly obstructed justice by refusing to testify and failing to produce up to 24,000 emails relevant to the investigations. This is simply unacceptable.

To make matters worse, the IRS experienced a cyber-attack in 2015 that left more than 700,000 taxpayer accounts vulnerable. And according to a GAO report released just last month, the IRS has improved only marginally since that time in regard to its data security. Taxpayers should not be subject to the political whims of unelected bureaucrats who refuse to follow the law and falsify facts before Congress, all the while placing their personal financial data at risk.

As a staunch fiscal conservative, I’ve been vocal and outspoken about the need for a fairer, flatter tax code – one that doesn’t stifle growth or punish economic success. After all, Ronald Reagan famously said that the role of government should be to fostereconomic growth, not smother it. That’s why I’ve joined more than 70 of my colleagues in cosponsoring legislation that would eliminate all individual and corporate income taxes – the FairTax Act of 2015 (H.R. 25).

The FairTax Act, introduced by Rep. Rob Woodall (GA-7), eliminates all personal, corporate, gift and estate taxes and replaces them with a simple, point-of-sale consumption tax. Beyond this, it completely abolishes the IRS and all of the bureaucratic red tape and corporate cronyism that comes with it – and remains revenue neutral in the process.

The FairTax Act combats the corruption and inefficiency of the IRS, and instead promotes American growth and investment. I’m proud to be a cosponsor of this key piece of legislation, because it recognizes that more freedom and less government is the formula for economic success. It’s this model that’s allowed Texas to lead the nation in job growth since 2008, and it’s about time for Washington to get an overdue dose of these commonsense, Texas economic values. The FairTax Act will do just that, and I urge my colleagues to support it.

Congressman John Ratcliffe represents Texas’ 4th district, serving the outer eastern suburbs of the Dallas-Fort Worth Metroplexsince 2015.  He is a member of the Judiciary Committee as well as the House Homeland Security Committee, serving as Chairman of its Cybersecurity, Infrastructure Protection, and Security Technologies Subcommittee.  Prior to Congress, he served as Mayor of Heath, Texas.  In addition, during the George W. Bush Administration, he was appointed to multiple posts, including U.S. Attorney and Chief of Anti-Terrorism and National Security for the Eastern District of Texas.

Your Money, Your Decision

The current federal income tax system is clearly broken — unfair, overly complex, and almost impossible for most Americans to understand. But there is a reasonable, nonpartisan alternative before Congress that is both fair and easy to understand. A system that allows you to keep your whole paycheck and only pay taxes on what you spend.

The FairTax is a national sales tax that treats every person equally and allows American businesses to thrive, while generating the same tax revenue as the current four-million-word-plus tax code. Under the FairTax, every person living in the United States pays a sales tax on purchases of new goods and services, excluding necessities due to the prebate. The FairTax rate after necessities is 23% compared to combining the 15% income tax bracket with the 7.65% of employee payroll taxes under the current system — both of which will be eliminated!

Important to note: the FairTax is the only tax plan currently being proposed that includes the removal of the payroll tax.

Keep Your Paycheck

For the first time in recent history, American workers will get to keep every dime they earn; including what would have been paid in federal income taxes and payroll taxes. You will get an instant raise in your pay!

Social Security & Medicare Funding

Benefits will not change. The FairTax actually puts these programs on a more solid funding foundation. Instead of being funded by taxes on workers’ wages, which is a small pool, they’ll be funded by taxes on overall consumption by all residents. Learn More .

Get a Tax Refund in Advance on Purchases of Basic Necessities

The FairTax provides a progressive program called a prebate. This gives every legal resident household an “advance refund” at the beginning of each month so that purchases made up to the poverty level are tax-free. The prebate prevents an unfair burden on low-income families. Learn more .

Pay Tax on Only What You Spend

Be in control of your financial destiny. You alone can control your tax burden. If you’re thrifty, you’ll pay lower taxes than somebody who is not. Most importantly, you’ll be taxed fairly. Learn moreabout what is taxed.

Everyone Pays Their Fair Share

Tax evasion and the underground economy cost each taxpayer an additional $2,500 every year! But by taxing new products and services consumed, the FairTax puts everyone in the country at the same level at the cash register. Further, only legal residents are eligible for the prebate. Learn more .

The IRS is No Longer Needed

No more complicated tax forms, individual audits, or intrusive federal bureaucracy. Retailers will collect the FairTax just as they do now with state sales taxes. All money will be collected and remitted to the U.S. Treasury, and both the retailers and states will be paid a fee for their collection service. Learn More

Summer looms with GOP stuck on health care, budget, taxes

The Capitol in Washington is quiet after lawmakers departed the for the Independence Day recess, Friday, June 30, 2017. The Republican leadership in the Senate decided this week to delay a vote on their…

WASHINGTON (AP) — Republicans are stuck on health care, can’t pass a budget, and hopes for a big, bipartisan infrastructure package are fizzling. Overhauling the tax code looks more and more like a distant dream.

The GOP-led Congress has yet to salt away a single major legislative accomplishment for President Donald Trump — and a summer of drift may lead to a logistical nightmare this fall.

Instead, Trump’s allies appear both divided and indecisive, unable to deliver on his agenda while letting other must-do congressional business — chiefly their core responsibilities of passing a budget and spending bills, and keeping the government solvent — slide onto an already daunting fall agenda that is looking more and more like it’ll be a train wreck.

Friday brought more bad news for Speaker Paul Ryan, R-Wis., and other House leaders as 20 GOP moderates signaled a revolt on the budget, penning a letter to Ryan announcing their opposition to an emerging plan to force cuts to government agencies and benefit programs such as food stamps. The letter, authored by Rep. Charlie Dent, R-Pa., warned that without an agreement with Democrats on increasing agency spending, moderates will be “reticent to support any budget.”

“It’s looking like they’re very disorganized. They got obviously a lot of conflict over spending preferences and it’s not just a two-way conflict,” said top House Budget Committee Democrat John Yarmuth of Kentucky. “It’s just a tough Rubik’s Cube they’re trying to solve.”

So it’s not just the Senate effort to repeal and replace Democrat Barack Obama’s health care law that’s foundering. The annual congressional budget measure — a prerequisite to this fall’s hoped-for tax effort — is languishing as well, as are the 12 annual spending bills that typically consume weeks of House floor time each summer.

But GOP leaders say all is going well. Ryan told a Wisconsin radio host on Thursday that “it’s the most productive Congress since the mid-’80s” and issued a news release Friday titled “Despite What You May Hear, We Are Getting Things Done.” The release cites a bipartisan Department of Veterans Affairs accountability measure and 14 bills repealing Obama-era regulations as Congress’ top achievements.

“It would be hard to fault the average American for thinking all that’s going on in Washington these days is high-drama hearings and partisan sniping,” Ryan said. “But amid the countdown clocks and cable news chatter, something important is happening: Congress is getting things done to help improve people’s lives.”

In the first year of a presidency, the annual August congressional recess is a traditional point to take stock. By that point, Obama had signed an economic recovery bill and President George W. Bush had won his landmark tax cuts, while President Bill Clinton was celebrating a hard-fought budget package.

Trump has no comparable successes to trumpet — but his allies in Congress say they’re not worried.

“We laid out an agenda in November and December, and we’re needing to get there,” said House Rules Committee Chairman Pete Sessions, R-Texas. “And we can effectively get there. The questions that confound us are those that we can answer ourselves. And we will.”

And as Republicans are stalled on health care, the budget and infrastructure, there are several other problems that need to be taken care of, including increasing the nation’s borrowing authority, preventing a government shutdown, and lifting budget “caps” that are hobbling efforts to beef up the military.

Unlike health care, the debt limit and a deal to fix the spending caps — a leftover from a failed 2011 budget deal — can only be resolved with Democratic help. However, they promise to consume political capital and valuable time and energy, and there’s no political pay-off, other than forestalling disaster.

First, Congress is off on vacation to return in July for a three-week session. Then comes the traditional monthlong August recess.

After Labor Day comes a four-week sprint to October and the deadline to avert a government shutdown with a temporary spending bill — and to forestall a disastrous default on U.S. obligations by lifting the debt limit, which is a politically toxic vote for many Republicans.

Sentiment is building among some lawmakers to shorten the recess to make progress on the unfinished work that is piling up. On Friday, 10 GOP senators, led by David Perdue of Georgia, sent Majority Leader Mitch McConnell, R-Ky., a letter citing delays on health care, the budget, a stopgap spending bill and the debt limit as reasons to consider canceling some or all of the recess.

“If we successfully navigate those priorities, we can finally get to our once in a generation opportunity on tax reform,” the letter said. “Growing the economy, repairing our infrastructure, and rebuilding our military are all dependent on accomplishing the tasks before us.”

http://wtop.com/government/2017/06/summer-looms-with-gop-stuck-on-health-care-budget-taxes/

APRIL 13, 2016

High-income Americans pay most income taxes, but enough to be ‘fair’?

Corporations paying fewer taxes

Tax-deadline season isn’t many people’s favorite time of the year, but most Americans are OK with the amount of tax they pay. It’s what other people pay, or don’t pay, that bothers them.

Just over half (54%) of Americans surveyed in fall by Pew Research Center said they pay about the right amount in taxes considering what they get from the federal government, versus 40% who said they pay more than their fair share. But in a separate 2015 surveyby the Center, some six-in-ten Americans said they were bothered a lot by the feeling that “some wealthy people” and “some corporations” don’t pay their fair share.

It’s true that corporations are funding a smaller share of overall government operations than they used to. In fiscal 2015, the federal government collected $343.8 billion from corporate income taxes, or 10.6% of its total revenue. Back in the 1950s, corporate income tax generated between a quarter and a third of federal revenues (though payroll taxes have grown considerably over that period).

Nor have corporate tax receipts kept pace with the overall growth of the U.S. economy. Inflation-adjusted gross domestic product has risen 153% since 1980, while inflation-adjusted corporate tax receipts were 115% higher in fiscal 2015 than in fiscal 1980, according to the Bureau of Economic Analysis. There have been a lot of ups and downs over that period, as corporate tax receipts tend to rise during expansions and drop off in recessions. In fiscal 2007, for instance, corporate taxes hit $370.2 billion (in current dollars), only to plunge to $138.2 billion in 2009 as businesses felt the impact of the Great Recession.

Corporations also employ battalions of tax lawyers to find ways to reduce their tax bills, from running income through subsidiaries in low-tax foreign countries to moving overseas entirely, in what’s known as a corporate inversion (a practice the Treasury Department has moved to discourage).

But in Tax Land, the line between corporations and people can be fuzzy. While most major corporations (“C corporations” in tax lingo) pay according to the corporate tax laws, many other kinds of businesses – sole proprietorships, partnerships and closely held “S corporations” – fall under the individual income tax code, because their profits and losses are passed through to individuals. And by design, wealthier Americans pay most of the nation’s total individual income taxes.

Wealthy pay more in taxes than poorIn 2014, people with adjusted gross income, or AGI, above $250,000 paid just over half (51.6%) of all individual income taxes, though they accounted for only 2.7% of all returns filed, according to our analysis of preliminary IRS data. Their average tax rate (total taxes paid divided by cumulative AGI) was 25.7%. By contrast, people with incomes of less than $50,000 accounted for 62.3% of all individual returns filed, but they paid just 5.7% of total taxes. Their average tax rate was 4.3%.

The relative tax burdens borne by different income groups changes over time, due both to economic conditions and the constantly shifting provisions of tax law. For example, using more comprehensive IRS data covering tax years 2000 through 2011, we found that people who made between $100,000 and $200,000 paid 23.8% of the total tax liability in 2011, up from 18.8% in 2000. Filers in the $50,000-to-$75,000 group, on the other hand, paid 12% of the total liability in 2000 but only 9.1% in 2011. (The tax liability figures include a few taxes, such as self-employment tax and the “nanny tax,” that people typically pay along with their income taxes.)

All told, individual income taxes accounted for a little less than half (47.4%) of government revenue, a share that’s been roughly constant since World War II. The federal government collected $1.54 trillion from individual income taxes in fiscal 2015, making it the national government’s single-biggest revenue source. (Other sources of federal revenue include corporate income taxes, the payroll taxes that fund Social Security and Medicare, excise taxes such as those on gasoline and cigarettes, estate taxes, customs duties and payments from the Federal Reserve.) Until the 1940s, when the income tax was expanded to help fund the war effort, generally only the very wealthy paid it.

Since the 1970s, the segment of federal revenues that has grown the most is the payroll tax – those line items on your pay stub that go to pay for Social Security and Medicare. For most people, in fact, payroll taxes take a bigger bite out of their paycheck than federal income tax. Why? The 6.2% Social Security withholding tax only applies to wages up to $118,500. For example, a worker earning $40,000 will pay $2,480 (6.2%) in Social Security tax, but an executive earning $400,000 will pay $7,347 (6.2% of $118,500), for an effective rate of just 1.8%. By contrast, the 1.45% Medicare tax has no upper limit, and in fact high earners pay an extra 0.9%.

All but the top-earning 20% of American families pay more in payroll taxes than in federal income taxes, according to a Treasury Department analysis.

Still, that analysis confirms that, after all federal taxes are factored in, the U.S. tax system as a whole is progressive. The top 0.1% of families pay the equivalent of 39.2% and the bottom 20% have negative tax rates (that is, they get more money back from the government in the form of refundable tax credits than they pay in taxes).

Of course, people can and will differ on whether any of this constitutes a “fair” tax system. Depending on their politics and personal situations, some would argue for a more steeply progressive structure, others for a flatter one. Finding the right balance can be challenging to the point of impossibility: As Jean-Baptiste Colbert, Louis XIV’s finance minister, is said to have remarked: “The art of taxation consists in so plucking the goose as to obtain the largest possible amount of feathers with the smallest possible amount of hissing.”

Note: This is an update of an earlier post published March 24, 2015.

http://www.pewresearch.org/fact-tank/2016/04/13/high-income-americans-pay-most-income-taxes-but-enough-to-be-fair/

Summary of the Latest Federal Income Tax Data, 2016 Update

February 1, 2017

Vice President Mike Pence stays loyal to Trump, but it could come at a cost

Noah Bierman Contact Reporter

The Republicans’ signature healthcare bill was in peril in Congress and President Trump was busy warring against media foes on Twitter.

Vice President Mike Pence, wearing a brown suit and his usual earnest expression, was far from the fray last week, here at a warehouse outside Cleveland amid metal rods and wooden crates for a “listening session” with small-business owners. Sitting at a drafting table, he ignored the camera lights as well as the trouble in Washington, dutifully hearing out complaints about healthcare, taking notes on a legal pad and promising the Ohioans that the Trump-Pence administration was close to replacingObamacare.

This is how Mike Pence copes with the drama that defines life as Donald Trump’s sidekick: acting like everything is normal, boringly normal. 

It requires a measure of willful disbelief, some salesmanship and a heap of praise for the president. But that coping strategy does not mask the fundamental challenge of Pence’s role since he became Trump’s running mate nearly a year ago: balancing his own reputation and political ambition against his loyalty to a man seemingly determined to scorch nearly every norm in Washington, and now enmeshed in a special counsel investigation in large part due to his own erratic behavior.

The vice president has made his choice, hitching his career to Trump’s unpredictable presidency, but lately he also has made a few notable moves toward protecting himself, hiring a personal attorney and establishing an independent political committee.

“It’s kind of perilous — skiing through moguls,” said Brian Howey, an Indiana political blogger who has chronicled Pence’s career from U.S. House member to Indiana governor to vice president. “How many times can you do that before you’re ensnarled in the web of deception?”

Friends say there is nothing to game out in Pence’s allegiance to Trump. Pence believes in the president, they say, and agrees with supporters who believe the White House is under unfairly harsh scrutiny. 

“What would happen if suddenly we found Trump is setting fire to the Humane Society?” said Greg Garrison, a conservative former radio host in Indiana who has long known Pence, choosing an absurd example to make the point that Trump’s recklessness has been exaggerated. “Does that mean Mike is going to go along? No, he’s not. But I think Mike is where he is because he understands this president and where we are right now.”

Yet just five months in, some observers say Pence’s chosen course as the captain of Trump’s cheering section has diminished his own gravitas and dashed the hopes of mainstream Republicans who thought Pence could serve as a check on the impulsive Trump.

“Recent vice presidents have been supportive of the president without surrendering a sense of personal dignity, without saying stuff that just doesn’t pass the straight-face test,” said Joel K. Goldstein, a St. Louis University law professor who has written about the modern vice presidency and its enhanced power.

For a parallel, Goldstein reached not to a vice president but to a well-known aide to President Lyndon B. Johnson, Jack Valenti, who was mocked for his over-the-top praise of his boss. Valenti, Goldstein said, is the only public figure in the modern era that came close to Pence’s level of presidential puffery.

What is more, Goldstein added, any notion that Pence’s power would be enhanced by his governing experience relative to the inexperienced Trump has been undermined by the sense that Pence lacks the standing to “go in with Trump and level with him on things.”

While Pence is often in the room with Trump and speaks with him nearly every day, he does not always command the president’s attention. That dynamic was evident during the first Cabinet meeting last month. Trump swiveled his head around the room and asked, “Where is our vice president?”

Pence sat right in front of him.

When the president finally spied his top deputy, Pence knew just what to say.

“The greatest privilege of my life is to serve as the — as vice president to the president who’s keeping his word to the American people and assembling a team that’s bringing real change, real prosperity, real strength back to our nation,” Pence said.

Taking their cue from Pence, the Cabinet secretaries then took turns extolling the president in ways that were widely derided as obsequious.

But for Pence, such flattery has come to define his persona. Variations on the line that serving Trump is “the greatest privilege of my life” are part of his stump speech, used among audiences as varied as Cuban Americans in Miami, evangelicals in Washington, troops in Honolulu, Japan and South Korea, and, last week, the factory workers in Ohio.

The younger Pence, with his square features, silver hair and wholesome rhetorical style, suggests a measured 1950s television dad, and as such stands in contrast to a president who developed his celebrity in the 21st century world of social media and reality television. His political discipline also contrasts with Trump’s extemporaneous politics.

As governor of Indiana, Pence was seen as a potential presidential candidate by many Republicans, at least until his popularity waned significantly. Certainly he was seen before the 2016 campaign as a more serious possibility than Trump. Pence is, in many ways, the type of establishment-blessed figure Trump ran against when he pledged to wrest power from career politicians.

But Pence came to see himself as Trump did, less as a contrast to the maverick mogul than as a complement.

“You don’t win six congressional elections and a gubernatorial election and a national ticket without having a sense of politics and self-preservation,” said Rep. Tom Cole, an Oklahoma Republican who served with Pence in the House leadership.

For Pence the key to melding Trump’s interests with his own, Cole said, is making clear that he’s only as valuable to the president as his reputation. “It doesn’t help him if he loses his credibility,” Cole said.

Pence has skirted that danger since his first month in office.

Though he led Trump’s presidential transition, Pence has said he did not know about meetings between Russian officials and Michael Flynn, Trump’s national security advisor during the campaign and initially in the White House, that are now central to the investigation into possible collusion to influence the 2016 election. So in January, on Flynn’s assurance, he falsely said on television that Flynn had not discussed with Russian Ambassador Sergey Kislyak the sanctions that President Obama imposed in December as penalty for Russia’s campaign meddling.

Flynn’s lying to the vice president was the reason given for his forced resignation, yet Trump and several advisors had been aware of Flynn’s deception for days.

Pence also said he did not know Flynn was secretly lobbying for Turkey until March, though Flynn, according to the New York Times, informed the transition team in early January that he was under investigation for failing to report the work he did as a foreign agent during the campaign.

And after Trump fired FBI Director James B. Comey, Pence insisted that the bureau’s Russia investigation had nothing to do with it, only to have Trump contradict him a day later in a nationally televised interview.

The incidents underscore Pence’s problem: His allies maintain he is a core inside player, yet at significant moments, they have insisted he was out of the loop. The friends dismiss such embarrassments, however, as the natural consequence of Trump being Trump, and Pence’s place as first in line whether the White House is on offense or defense.

“He understands he has a job and his job is to be a loyal soldier, and he’s a very effective communicator,” said Pete Seat, an official with the Indiana Republican Party. “So sometimes the job of being first one out of the gate falls on him.”

David McIntosh, the Indiana Republican whom Pence replaced in Congress, said “there were two truths” in the Comey firing. There was the one Pence told — that Justice Department leaders recommended Comey be fired — and the one that Trump later told, that he would have fired Comey regardless of that recommendation.

“One thing I think Mike would not do is make the first statement if he thought it was not true,” said McIntosh, disregarding Pence’s insistence that Comey’s firing had nothing to do with the Russia investigation when Trump later said it did.

Pence, who turned 58 last month, came to prominence in Indiana as a talk radio host in the 1990s, building a brand as a conservative Christian who chose to make his points without turning up the volume.

Elected to Congress on his third try, Pence initially was a conservative renegade. But he proved to be in the vanguard of what became the tea party movement. Sen. Jeff Flake, an Arizona Republican whose office was next to Pence’s when the Indianan was in Congress, remembers the two of them bursting through the House doors together on late nights — like Butch Cassidy and the Sundance Kid into a saloon — to halt spending measures, and offering slow claps for President George W. Bush’s spending plans during a State of the Union address.

Flake said Pence’s ability to stay relentlessly on message endeared him to other conservatives, propelling him into the House leadership ranks.

Next, as Indiana’s governor for four years, he built on his conservative credentials while showing a willingness to bend on a few issues, including allowing expansion of Medicaid as part of Obamacare. He suffered his biggest setback on a religious liberty bill that allowed store owners to refuse services for gay weddings; Pence retreated under pressure from groups concerned the law would hurt Indiana’s reputation and its ability to recruit workers and businesses from out of state.

Pence’s allies say he has maintained important credibility in Congress, both because he served there and because of his alliance with House Speaker Paul D. Ryan. He was influential as Trump made his Cabinet choices and enlisted Judge Neil M. Gorsuch for the Supreme Court, a selection that united Republicans more than any decision Trump has made in the White House. But his role as a conduit to Congress is being tested by Republicans’ divisions over the healthcare bill, which Pence has repeatedly promised would get out of Congress by the end of summer.

Pence, through his press office, declined an interview request, citing his desire to avoid discussing his role or influence. He has been careful to avoid taking credit, an important trait to a president who wants it for himself and is angered by those who flaunt their influence. If the vice president has had any disagreements with Trump, they have not been leaked, a rarity in the White House.

Pence associates say he is most comfortable in the policy realm, letting Trump pick his tasks and define his role. That has included trips to Asia and Europe and another planned for Latin America in August. By sticking to script and avoiding free-form interactions with the press, Pence has avoided getting dragged further into controversies over the Russia investigation and Trump’s tweets.

As Comey testified in Congress last month that the president lied and tried to halt the investigations of Flynn and Russia, Pence once again found a spot for himself away from the tumult.

Before an ornate room full of governors and state officials near the White House, Pence focused on the administration’s theme of the week: roads, bridges and airports. He spoke about the “builder in the White House,” even as Trump himself had overshadowed that message with tweets assailing the mayor of London, the media and his Justice Department.

“Folks,” Pence said, “it’s already been a banner week for infrastructure.”

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 916-922

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

 

 

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 906, June 7, 2017, Story 1: Will Congress Reauthorize Section 702 Foreign Intelligence Surveillance Act? Yes with changes to protect the privacy of American People. — How About Executive Order 12333 That Allow The President To Target Americans Without A Warrant — Unconstitutional and Illegal — Happens Every Day! — Oversight My Ass –Videos — Story 2: National Security Agency Under Obama Spied On American People —  Obama’s Abuse of Power — Huge Scandal Ignored By Big Lie Media — Videos — Story 3: President Trump To Nominate Christopher A. Wray For FBI Director — Videos

Posted on June 7, 2017. Filed under: Airlines, American History, Barack H. Obama, Benghazi, Bill Clinton, Blogroll, Breaking News, Budgetary Policy, Cartoons, China, Climate, Climate Change, Coal, Coal, College, Communications, Computers, Congress, Constitutional Law, Corruption, Countries, Crime, Culture, Defense Spending, Donald J. Trump, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Education, Elections, Empires, Employment, Energy, Environment, Fast and Furious, Federal Government, Fiscal Policy, Foreign Policy, Former President Barack Obama, Fourth Amendment, Free Trade, Freedom of Speech, Government, Government Spending, Health, High Crimes, Hillary Clinton, Hillary Clinton, Hillary Clinton, History, House of Representatives, Human, Human Behavior, Illegal Immigration, Illegal Immigration, Immigration, Iran Nuclear Weapons Deal, Iraq, IRS, Islam, Islamic Republic of Iran, Islamic State, Israel, Labor Economics, Language, Law, Legal Immigration, Libya, Life, Lying, Media, Middle East, National Interest, Natural Gas, Natural Gas, News, Nuclear, Obama, Oil, Oil, People, Philosophy, Photos, Politics, Polls, President Barack Obama, President Trump, Progressives, Qatar, Radio, Rand Paul, Raymond Thomas Pronk, Regulation, Religion, Resources, Robert S. Mueller III, Rule of Law, Scandals, Science, Security, Senate, Solar, Spying on American People, Surveillance/Spying, Syria, Taxation, Taxes, Technology, Terror, Terrorism, Trade Policy, Transportation, Trump Surveillance/Spying, U.S. Negotiations with Islamic Republic of Iran, Unemployment, United States Constitution, United States of America, United States Supreme Court, Videos, Violence, War, Wealth, Weapons, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 906,  June 7, 2017

Pronk Pops Show 905,  June 6, 2017

Pronk Pops Show 904,  June 5, 2017

Pronk Pops Show 903,  June 1, 2017

Pronk Pops Show 902,  May 31, 2017

Pronk Pops Show 901,  May 30, 2017

Pronk Pops Show 900,  May 25, 2017

Pronk Pops Show 899,  May 24, 2017

Pronk Pops Show 898,  May 23, 2017

Pronk Pops Show 897,  May 22, 2017

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Image result for section 702 Information nsa

Image result for new fbi director chrisopher A. Wray

Image result for cartoons obama nsa spied on american citizens

 

Story 1: Will Congress Reauthorize Section 702 Foreign Intelligence Surveillance Act? Yes with changes to protect the privacy of American People — How About Executive Order 12333 That Allows The President To Target American Citizens Without A Warrant — Unconstitutional and Illegal — Happens Every Day! — Oversight My Ass –Videos

Image result for fisa amendments act of 2008

Image result for executive order 12333

Image result for intelligence community

Image result for intelligence community

Image result for intelligence community

Image result for executive order 12333

Image result for introduction to prism

Image result for reauthorization section 702 of FISA surveillance program

Image result for prism slides

Image result for section 702 reauthorization of surveillance program

Image result for prism slides

Image result for prism slides

Image result for prism slides

Image result for fisa amendments act of 2008

FISA: 702 Collection

In 2008, Congress passed a set of updates to the Foreign Intelligence Surveillance Act (FISA), including Section 702 which authorized warrantless surveillance of non-U.S. persons reasonably believed to be outside the country. However, documents leaked by Edward Snowden revealed that 702 was being used far more heavily than many expected, serving as the legal basis for the collection of large quantities of telephone and Internet traffic  passing through the United States (and unlike 215, including content rather than just metadata). Still, as 702 only permits overseas collection, most criticism of the provision has come from abroad. But many domestic privacy advocates also worry that large amounts of American communication are being swept up “incidentally” and then used as well.

How the Senate hearing on surveillance turned into a Russia hearing

Blunt Questions National Security Officials Regarding Russia Investigation & FISA 6/7/17

FULL: Rosenstein, Intel Chiefs Testify at Senate Hearing on President Trump and Russia Investigation

Heinrich Questions Top Intelligence Officials In Senate Intel Committee Hearing

Senator Kamala Harris Grills Deputy AG Rosenstein On Whether He Has Given Mueller Full Independence

Trump Russia Collusion Investigation, Part 1 – Senate Intelligence Committee – FISA 6/7/2017

Trump Russia Collusion Investigation, Part 2 – Senate Intelligence Committee – FISA 6/7/2017

Trump Russia Collusion Investigation, Part 3 – Senate Intelligence Committee – FISA 6/7/2017

‘You Went Back on a Pledge!’ Dem. Senator Gets Nasty With DNI Chief Dan Coats

June 7, 2017: Sen. Cotton’s Q&A at Senate Intel Committee FISA Hearing

OPENING STATEMENT: Director of National Intelligence Dan Coats Testifies at Senate Intel Committee

Senate Russia Investigation: National security officials testify to intelligence committee on FISA

Rand Paul on Unmaskings: ‘We Can’t Live in Fear of Our Own Intelligence Community’

Rand Paul on Obama Illegally Spying on Americans | NSA Wiretapping

Section 702 of the FISA Amendments Act

FISA Hearing – Sec 702 Intel Surveillance – IMPORTANT

NSA Spying On Americans ‘Widespread’ – Let Sec. 702 Expire!

Bill Binney explodes the Russia witchhunt

Obama’s NSA conducted illegal searches on Americans for years: Report

NSA Whistleblower Bill Binney on Tucker Carlson 03.24.2017

NSA Whistleblower Bill Binney On 9/11

William Binney – The Government is Profiling You (The NSA is Spying on You)

NSA Whistleblower William Binney: The Future of FREEDOM

State of Surveillance: Police, Privacy and Technology

The Fourth Amendment Explained: US Government Review

Why We’re Losing Liberty

Sen. Rand Paul Defends the Fourth Amendment – February 11, 2014

Rand Paul Shames Homeland Security on Spying on Americans

Top Intel Community Officials Deny That Trump Pressured Them On Russia Probe

Photo of Chuck Ross

CHUCK ROSS
Reporter

The directors of the Office of National Intelligence and the National Security Agency testified on Wednesday that they have not been pressured by President Trump on the ongoing Russia investigation, undercutting recent reports that they were.

Dan Coats, the director of national intelligence, and Adm. Mike Rogers, the director of NSA, largely declined to discuss details about their interactions with Trump when pressed on the matter during a Senate Intelligence Committee hearing.

According to news reports published last month, Trump asked both Coats and Rogers to rebut stories that Trump was under investigation as part of the Russia probe.

Both Coats and Rogers reportedly felt uncomfortable with the requests from Trump.

But when asked about those interactions on Wednesday, both declined to discuss their specific conversations with Trump while stating that they have never felt pressure from the White House.

“In the three-plus years that I have been the director of the National Security Agency, to the best of my recollection, I have never been directed to do anything that I believe to be illegal, immoral, unethical or inappropriate. And to the best of my collection … I do not recall ever feeling pressured to do so,” Rogers told Virginia Sen. Mark Warner, the vice chairman of the Senate panel.

“Did the president … ask you in any way, shape or form to back off or downplay the Russia investigation?” Warner asked.

Rogers said that he would not discuss specifics of conversations he had with Trump, but added: “I stand by the comment I just made, sir.”

Coats, a former Indiana senator who was appointed by Trump, also denied ever being pressured to downplay the Russia investigation or any other.

On Tuesday, The Washington Post reported that Coats told associates on March 22 that Trump asked him to intervene with former FBI Director James Comey to push back against the Russia investigation.

“In my time of service … I have never been pressured, I have never felt pressure, to intervene or interfere in any way, with shaping intelligence in a political way or in relationship to an ongoing investigation,” Coats testified Wednesday.

http://dailycaller.com/2017/06/07/top-intel-community-officials-deny-that-trump-pressured-them-on-russia-probe/

The Way the NSA Uses Section 702 is Deeply Troubling. Here’s Why.

MAY 7, 2014

This blog post was updated at 5:10 pm PST 5/8/14.

The most recent disclosure of classified NSA documents revealed that the British spy agency GCHQ sought unfettered access to NSA data collected under Section 702 of the FISA Amendments Act. Not only does this reveal that the two agencies have a far closer relationship than GCHQ would like to publicly admit, it also serves as a reminder that surveillance under Section 702 is a real problem that has barely been discussed, much less addressed, by Congress or the President.

In fact, the “manager’s amendment” to the USA FREEDOM Act, which passed unanimously out of the House Judiciary Committee, has weakened the minimal changes to Section 702 that USA FREEDOM originally offered. Although Representative Zoe Lofgren—who clearly understands the import of Section 702—offered several very good amendments that would have addressed these gaps, her amendments were all voted down. There’s still a chance though—as this bill moves through Congress it can be strengthened by amendments from the floor.

Section 702 has been used by the NSA to justify mass collection of phone calls and emails by collecting huge quantities of data directly from the physical infrastructure of communications providers. Here’s what you should know about the provision and why it needs to be addressed by Congress and the President:

  • Most of the discussion around the NSA has focused on the phone records surveillance program. Unlike that program, collection done under Section 702 capturescontent of communications. This could include content in emails, instant messages, Facebook messages, web browsing history, and more.
  • Even though it’s ostensibly used for foreign targets, Section 702 surveillance sweeps up the communications of Americans. The NSA has a twisted, and incredibly permissive, interpretation of targeting that includes communications about a target, even if the communicating parties are completely innocent. As John Oliver put it in his interview with former NSA General Keith Alexander: “No, the target is not the American people, but it seems that too often you miss the target and hit the person next to them going, ‘Whoa, him!'”
  • The NSA has confirmed that it is searching Section 702 data to access American’s communications without a warrant, in what is being called the “back door search loophole.”  In response to questions from Senator Ron Wyden, former NSA director General Keith Alexander admitted that the NSA specifically searches Section 702 data using “U.S. person identifiers,” for example email addresses associated with someone in the U.S.
  • The NSA has used Section 702 to justify programs in which the NSA can siphon off large portions of Internet traffic directly from the Internet backbone. These programs exploit the structure of the Internet, in which a significant amount of traffic from around the world flows through servers in the United States. In fact, through Section 702, the NSA has access to information stored by major Internet companies like Facebook and Google.
  • Section 702 is likely used for computer security operations. Director of National Intelligence James Clapper noted Section 702’s use to obtain communications “regarding potential cyber threats” and to prevent “hostile cyber activities.” Richard Ledgett, Deputy Director of NSA, noted the use of intelligence authorities to mitigate cyber attacks.
  • The FISA Court has little opportunity to review Section 702 collection. The court approves procedures for 702 collection for up to a year. This is not approval of specific targets, however; “court review [is] limited to ‘procedures’ for targeting and minimization rather than the actual seizure and searches.” This lack of judicial oversight is far beyond the parameters of criminal justice.
  • Not only does the FISA Court provide little oversight, Congress is largely in the dark about Section 702 collection as well. NSA spying defenders say that Congress has been briefed on these programs. But other members of Congress have repeatedly noted that it is incredibly difficult to get answers from the intelligence community, and that attending classified hearings means being unable to share any information obtained at such hearings. What’s more, as Senator Barbara Mikulski stated: “‘Fully briefed’ doesn’t mean that we know what’s going on.”  Without a full picture of Section 702 surveillance, Congress simply cannot provide oversight.
  • Section 702 is not just about keeping us safe from terrorism. It’s a distressingly powerful surveillance tool. While the justification we’ve heard repeatedly is that NSA surveillance is keeping us safer, data collected under Section 702 can be shared in a variety of circumstances, such as ordinary criminal investigations. For example, the NSA has shared intelligence with the Drug Enforcement Agency that has led to prosecutions for drug crimes, all while concealing the source of the data.
  • The President has largely ignored Section 702. While the phone records surveillance program has received significant attention from President Obama, in his speeches and his most recent proposal, Section 702 remains nearly untouched.
  • The way the NSA uses Section 702 is illegal and unconstitutional—and it violates international human rights law. Unlike searches done under a search warrant authorized by a judge, Section 702 has been used by the NSA to get broad FISA court authorization for general search and seizure of huge swathes of communications. The NSA says this is OK because Section 702 targets foreign citizens. The problem is, once constitutionally protected communications of Americans are swept up, the NSA says these communications are “fair game” for its use.
  • Innocent non-Americans don’t even get the limited and much abused protections the NSA promises for Americans. Under international human rights law to which the United States is a signatory, the United States must respect the rights of all persons. With so many people outside the United States keeping their data with American companies, and so much information being swept up through mass surveillance, that makes Section 702 the loophole for the NSA to violate the privacy rights of billions of Internet users worldwide.

The omission of Section 702 reform from the discourse around NSA surveillance is incredibly concerning, because this provision has been used to justify some of the most invasive NSA surveillance. That’s why EFF continues to push for real reform of NSA surveillance that includes an end to Section 702 collection. You can help by educating yourself and engaging your elected representatives. Print out our handy one-page explanation of Section 702. Contact your members of Congress today and tell them you want to see an end to all dragnet surveillance, not just bulk collection of phone records.

https://www.eff.org/deeplinks/2014/05/way-nsa-uses-section-702-deeply-troubling-heres-why

 

By ZACK WHITTAKER CBS NEWS June 30, 2014, 4:02 PM
Legal loopholes could allow wider NSA surveillance, researchers say
CBS NEWS

NEW YORK — Secret loopholes exist that could allow the National Security Agency to bypass Fourth Amendment protections to conduct massive domestic surveillance on U.S. citizens, according to leading academics.

The research paper released Monday by researchers at Harvard and Boston University details how the U.S. government could “conduct largely unrestrained surveillance on Americans by collecting their network traffic abroad,” despite constitutional protections against warrantless searches.

One of the paper’s authors, Axel Arnbak of Harvard University’s Berkman Center for Internet & Society, told CBS News that U.S. surveillance laws presume Internet traffic is non-American when it is collected from overseas.

“The loopholes in current surveillance laws and today’s Internet technology may leave American communications as vulnerable to surveillance, and as unprotected as the internet traffic of foreigners,” Arnbak said.

Although Americans are afforded constitutional protections against unwarranted searches of their emails, documents, social networking data, and other cloud-stored data while it’s stored or in-transit on U.S. soil, the researchers note these same protections do not exist when American data leaves the country.

Furthermore, they suggest that Internet traffic can be “deliberately manipulated” to push American data outside of the country. Although the researchers say they “do not intend to speculate” about whether any U.S. intelligence agencies are actually doing this, they say it could provide a loophole for vacuuming up vast amounts of U.S. citizen data for intelligence purposes, thus “circumventing constitutional and statutory safeguards seeking to protect the privacy of Americans,” they warned.

Play VIDEO
Snowden: NSA programs “uncontrolled and dangerous”
The academic paper lands just over a year since the Edward Snowden revelations first came to light, outlining the massive scope of U.S. government surveillance, under the justification of preventing terrorism. Although the classified programs that make up the NSA’s data acquisition arsenal have only recently been disclosed over the past year, the laws that govern them have been under close scrutiny for years. The paper only adds fuel to the fire of the intelligence agency’s alleged spying capabilities, which have been heavily criticized by civil liberties and privacy groups alike.

“The fix has to come from the law — the same laws that apply to Internet traffic collected domestically should also apply to traffic that is collected abroad,” the paper’s co-author, Sharon Goldberg of Boston University’s Computer Science Department, said.

While the researchers do not say whether these loopholes are being actively exploited — saying their aim is solely to broaden the understanding of the current legal framework — the current legislation as it stands “opens the door for unrestrained surveillance,” they write.

Since the September 11 terrorist attacks, the subsequent introduction of the Patriot Act allowed certain kinds of data to be collected to help in the fight against terrorism — so-called “metadata,” such as the time and date of phone calls and emails sent, including phone numbers and email addresses themselves. But the contents of those phone calls or emails require a warrant. The classified documents leaked by Edward Snowden showed that while the public laws have been in effect for years or even decades, the U.S. government has used secret and classified interpretations of these laws for wider intelligence gathering outside the statutes’ text.

The Obama administration previously said there had been Congressional and Judicial oversight of these surveillance laws — notably Section 215 of the Patriot Act, which authorized the collection of Americans’ phone records; and Section 702 of the Foreign Intelligence Surveillance Act (FISA), which authorized the controversial PRISM program to access non-U.S. residents’ emails, social networking, and cloud-stored data.

But the researchers behind this new study say that the lesser-known Executive Order (EO) 12333, which remains solely the domain of the Executive Branch — along with United States Signals Intelligence Directive (USSID) 18, designed to regulate the collection of American’s data from surveillance conducted on foreign soil — can be used as a legal basis for vast and near-unrestricted domestic surveillance on Americans.

The legal provisions offered under EO 12333, which the researchers say “explicitly allows for intentional targeting of U.S. persons” for surveillance purposes when FISA protections do not apply, was the basis of the authority that reportedly allowed the NSA to tap into the fiber cables that connected Google and Yahoo’s overseas to U.S. data centers.

An estimated 180 million user records, regardless of citizenship, were collected from Google and Yahoo data centers each month, according to the leaked documents. The program, known as Operation MUSCULAR, was authorized because the collection was carried out overseas and not on U.S. soil, the researchers say.

The paper also said surveillance can also be carried out across the wider Internet by routing network traffic overseas so it no longer falls within the protection of the Fourth Amendment.

However, an NSA spokesperson denied that either EO 12333 or USSID 18 “authorizes targeting of U.S. persons for electronic surveillance by routing their communications outside of the U.S.,” in an emailed statement to CBS News.

“Absent limited exception (for example, in an emergency), the Foreign Intelligence Surveillance Act requires that we get a court order to target any U.S. person anywhere in the world for electronic surveillance. In order to get such an order, we have to establish, to the satisfaction of a federal judge, probable cause to believe that the U.S. person is an agent of a foreign power,” the spokesperson said.

The report highlights a fundamental fact about Internet traffic: Data takes the quickest route possible rather than staying solely within a country’s borders. Data between two U.S. servers located within the U.S. can still sometimes be routed outside of the U.S.

Although this is normal, the researchers warn data can be deliberately routed abroad by manipulating the Internet’s core protocols — notably the Border Gateway Protocol (BGP), which determines how Internet traffic is routed between individual networks; and the Domain Name Service (DNS), which converts website addresses to numerical network addresses.

If the NSA took advantage of the loophole by pushing Internet traffic outside of the U.S., it would have enough time to capture the data while it is outside the reach of constitutional protection.

The researchers rebuffed the NSA’s statement in an email: “We argue that these loopholes exist when surveillance is conducted abroad and when the authorities don’t ‘intentionally target a U.S. person’. There are several situations in which you don’t ‘target a U.S. person’, but Internet traffic of many Americans can in fact be affected.”

“We cannot tell whether these loopholes are exploited on a large scale, but operation MUSCULAR seems to find its legal and technical basis in them.”

Mark M. Jaycox, a legislative analyst at the Electronic Frontier Foundation (EFF), said: “If you are intentionally spying on a U.S. person, the government must go to the FISA Court,” he said. “That’s the way the law is supposed to operate.”

Describing how the NSA says it never “intentionally collects” U.S. information, he warned the agency’s foreign data dragnet would inevitably include U.S. data.

“The NSA is an intelligence organization — it’s going to be targeting foreigners. But it’s the way that its targeting millions of foreigners, and millions of foreign communications that will eventually pick up U.S. persons’ data and information. And once that data has been collected, it must be destroyed.”

“It’s a question the NSA can’t reconcile, so they lean heavily on saying they never ‘intentionally collect’ the U.S. person information,” he said

A recent primer on EO 12333 written by the privacy group said the order “mandates rules for spying… on anyone within the United States.” The group also notes because the order remains inside the Executive Branch, the Obama administration could “repeal or modify” it at will.

The American Civil Liberties Union said in a post on its website that the U.S. government interprets USSID 18 to “permit it to sweep up Americans’ international communications without any court order and with little oversight.”

Patrick Toomey, staff attorney at the American Civil Liberties Union’s National Security Project, said: “Today, Americans’ communications increasingly travel the globe — and privacy protections must reliably follow. This academic paper raises key questions about whether our current legal regime meets that standard, or whether it allows the NSA to vacuum up Americans’ private data simply by moving its operations offshore.”

He added that there should be a uniform set of laws that protect Americans’ privacy regardless of where they are in the world, and that Congressional oversight of all rules governing surveillance is needed for comprehensive reforms.

The ACLU has also filed a Freedom of Information lawsuit with a federal court in New York, questioning “whether it [EO 12333] appropriately accommodates the constitutional rights of American citizens and residents whose communications are intercepted in the course of that surveillance.”

Although there is no direct evidence yet to suggest the NSA has exploited this loophole, network monitoring firm Renesys observed two “route hijacking” events in June and November 2013 that led Internet traffic to be redirected through Belarus and Iceland on separate occasions. These events are virtually unnoticeable to the ordinary Internet user, but the side effect is that U.S. data may be readable by foreign governments traveling through their country’s infrastructure. It also could allow the NSA to capture that data by treating it as foreign data.

These legal and technical loopholes can allow “largely unrestrained surveillance on Americans communications,” the researchers wrote.

The NSA, whose job it is to produce intelligence from overseas targets, said for the first time in August 2013 that it derives much of its “foundational authority” for its operations from EO 12333. Recent Snowden disclosures shed new light on understanding the capabilities of the executive order.

It was also recently revealed that Snowden himself questioned the legal authority of EO 12333, according to one declassified email exchange released by the Director of National Intelligence James Clapper.

According to John Schindler, a former NSA chief analyst, speaking to The Washington Post in October, the sole aim of the NSA’s “platoon” of lawyers’ is to figure out “how to stay within the law and maximize collection by exploiting every loophole.”

“It’s fair to say the rules are less restrictive under [EO] 12333 than they are under FISA,” he added.

FISA expanded the NSA’s powers allowing it to obtain foreign intelligence — including economic and political surveillance of foreign governments, companies, news outlets and citizens. But the amended law in 2008 also restricted what can be collected on U.S. citizens.

The so-called “targeting” and “minimization” procedures, which remain classified but were reported as a result of the Snowden leaks, were introduced to ensure any data inadvertently collected on U.S. citizens from overseas would not be used in investigations. These were later criticized following subsequent leaks which suggested the rules on collecting U.S. persons’ data were more relaxed than the statute led the public to believe.

U.S. intelligence agencies can only do so much with U.S. data, therefore they have a “strong incentive to conduct surveillance abroad,” the researchers say, because legal protections under the Fourth Amendment and FISA do not apply outside U.S. territory.

“Programs under EO 12333 may collect startling amounts of sensitive data on both foreigners and Americans,” the paper summarizes, “without any meaningful congressional or judiciary involvement.”

http://www.cbsnews.com/news/legal-loopholes-could-let-nsa-surveillance-circumvent-fourth-amendment-researchers-say/

 

FISA Authority and Blanket Surveillance: A Gatekeeper Without Opposition

Vol. 40 No. 3

The author is with ZwillGen PLLC in Washington, D.C.

Surveillance and espionage were once practices ordinary Americans only read about in novels or saw in movie theaters. That is no longer true. America is at the center of a worldwide communications network. It is home to the world’s most popular telecommunications, email, instant message, and video chat providers. Because of America’s unique role, hundreds of millions of users send communications through American soil. At the same time, America’s enemies have grown from nation-states, like the Soviet Union, to small cells of terrorists that use ordinary communications networks. Taken together, it is not surprising that signals intelligence agencies like the National Security Agency (NSA), which intercept and analyze these signals, would seek and use surveillance powers to conduct more surveillance at home.

Part of this new regime means that more legal process to gather intelligence is being served on companies in the United States. Recent revelations have declassified documents describing the NSA’s broad “collect now, search later” approach to surveillance. This means that some electronic communications providers, and their in-house and outside counsel, are faced with new forms of legal process. But unlike criminal process, which is rooted in a large body of publicly available case law and which often comes to light in the course of criminal trials, this new process comes to these providers in secret. As documents recently declassified by the director of national intelligence demonstrate, the government has served a number of different kinds of orders on providers—each of whom must assess when and how they might comply with or challenge those orders.

My firm and I represented one such provider in In re Directives [Redacted] Pursuant to Section 105B of the Foreign Intelligence Surveillance Act [Redacted], 551 F.3d 1004 (FISA Ct. Rev. 2008). That case presented a challenge that more providers may face as the NSA explores its surveillance capabilities. The provider received process known as a 105B directive (which is now called a 702 directive) starting in 2007. In contrast with typical criminal process, there was no prior court review or approval of particular surveillance targets. Instead, a 702 directive, like the one served on that provider, approved of the government’s procedure for conducting surveillance—not its targets.

 

Faced with this process, the provider had to make decisions about how it could respond. The provider chose not to comply with the process, and the government filed a motion to compel in the Foreign Intelligence Surveillance Court (FISC), a secret court charged with reviewing and approving some types of surveillance.

The course of that litigation proved complex. The Foreign Intelligence Surveillance Court of Review (FISCR), which handles appeals from the FISC, had published a single opinion before the In re Directives case, and while the lower court, the FISC, had rules for proceedings, there were no publicly available decisions on which to rely in litigating the procedural aspects of the case. The merits of the case too were litigated in the dark. No docket was made available, and there was no public mention of the case until after it was appealed and the FISCR entered its decision. Some documents related to the case are still being declassified, but in the words of the FISCR’s declassified decision, there was “multitudinous briefing” in the FISC and ample briefing on appeal.

The FISCR released its opinion in In re Directives in 2009, and a beam of light shone on its decisions for the first time in seven years. But then the FISC went dark again. In late 2013, however, the director of national intelligence, in response to increased public pressure seeking information on surveillance activities, began releasing more FISC opinions that are instructive on how the FISC operates and how it has been interpreting the Fourth Amendment and process under the Foreign Intelligence Surveillance Act, 50 U.S.C. § 1801 et seq. (FISA) in the intervening years, giving much needed guidance to providers and outside counsel.

 

The History of FISA

Understanding how to advise clients faced with FISA process, the challenges they face, and how to revise FISA to address public concerns about the NSA’s “collect now, search later” surveillance requires some history, legal analysis, and creative thinking. FISA’s history provides context for the reforms needed to adjust the balance between surveillance and privacy. Current events provide information about the extent of the problem. And creative thinking is required to create solutions.

FISA occupies an uneasy place. It resides where intelligence gathering meets the Fourth Amendment. FISA addresses the problem of how, and when, the government can conduct surveillance for intelligence-gathering purposes on United States soil. Over time, Congress has addressed this delicate balance by amending FISA to expand and contract surveillance capabilities. Today, FISA provides a comprehensive set of procedures for obtaining and using “foreign intelligence information” within the United States.

Before Congress passed FISA in 1978, there were no clear rules for when the executive branch could conduct clandestine surveillance for foreign intelligence purposes. Prior to FISA, every president since at least 1931 used surveillance to protect national security interests—even when no law specifically allowed that surveillance. See Sen. Rep. No. 94-755 (1976), Book III, Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans [hereinafter Church Report], available at www.intelligence.senate.gov/pdfs94th/94755_III.pdf. Presidents justified this surveillance by pointing to their role as commander-in-chief combined with their duty and authority to execute the laws of the United States. U.S. Const. art. II, § 1, § 2, cl. 1; see Church Report, supra, at 279.

This power remained relatively untested until the seminal case United States v. U.S. District Court for Eastern District of Michigan, Southern Division, 407 U.S. 297 (1972), also known as the Keith case. There, the government prosecuted three individuals for conspiring to bomb an office of the Central Intelligence Agency in Ann Arbor, Michigan. The Keith defendants moved to compel the government to disclose electronic surveillance information the government collected without first getting a warrant. The attorney general argued the surveillance satisfied the Fourth Amendment because it was necessary “to gather intelligence information deemed necessary to protect the nation from attempts of domestic organizations to attack and subvert the existing structure of the Government.” Id. at 300. The Supreme Court found that the government must get a warrant before engaging in domestic surveillance, but limited its opinion to “domestic aspects of national security” and stated that it “express[ed] no opinion as to the issues which may be involved with respect to activities of foreign powers or their agents.” Id. at 321. Keith changed the landscape of domestic surveillance, but lower courts struggled to decide when surveillance required a warrant and when surveillance fell outside Keith’s holding; as a result, they increasingly invalidated surveillance. See Zweibon v. Mitchell, 516 F.2d 594, 651 (D.C. Cir. 1975).

Faced with this uncertainty and the revelations about warrantless surveillance, the Senate created the Church Committee to investigate the executive branch’s use of warrantless surveillance. The committee’s report provided revelations much like those that are coming to light today as a result of Edward Snowden’s leaks. The committee’s report, which is actually 14 separate reports regarding intelligence abuses, provides one of the most extensive, in-depth examinations of the use and abuse of surveillance powers in the United States. The Church Report revealed that from the early 1960s to 1972, the NSA targeted certain Americans’ international communications by placing their names on a watch list. It contended that intercepting these Americans’ communications was part of monitoring programs it was conducting against international communications channels. As is the case in news reports today, “to those Americans who have had their communications—sent with the expectation that they were private—intentionally intercepted and disseminated by their Government, the knowledge that NSA did not monitor specific communications channels solely to acquire their message is of little comfort.” Church Report, supra, at 735.

History tends to repeat itself. Today, newspapers have reported that the NSA engages in bulk telephone records surveillance using the “Business Records” provision in section 215 of FISA (50 U.S.C. § 1861). This bulk surveillance, however, isn’t anything new. The Church Report provides shockingly similar revelations about the NSA’s Operation SHAMROCK. Much like recent revelations about today’s bulk records collection, Operation SHAMROCK, which lasted all the way from August 1945 until May 1975, collected millions of telegrams leaving or transiting the United States and monitored certain telephone links between the United States and South America. As part of this monitoring, the NSA intercepted Americans’ international communications and disseminated those communications to other intelligence agencies. In doing so, the NSA “never informed the companies that it was analyzing and disseminating telegrams of Americans.” Unlike today, however, “the companies, who had feared in 1945 that their conduct might be illegal, apparently never sought assurances that NSA was limiting its use to the messages of foreign targets once the intercept program had begun.” Church Report, supra, at 740–41.

The NSA discontinued SHAMROCK in 1975, but it still incidentally collected Americans’ communications—much like it does (to a lesser extent) today. The Church Committee described the NSA’s “initial interception of a stream of communications” as “analogous to a vacuum cleaner.” “NSA picks up all communications carried over a specific link that it is monitoring. The combination of this technology and the use of words to select communications of interest results in NSA analysts reviewing the international messages of American citizens, groups, and organizations for foreign intelligence.” Id. at 741. This is eerily similar to the FISC’s description of bulk records collection as recently as October 2011, in which it stated “that NSA has acquired, is acquiring, and . . . will continue to acquire tens of thousands of wholly domestic communications,” Redacted, slip op. at 33 (FISA Ct. Oct. 3, 2011), because it intercepts all communications over certain Internet links it is monitoring and is “unable to exclude certain Internet transactions.” Id. at 30.

 

Purposes of FISA

That history tells us where FISA comes from and the problems Congress was trying to solve. Congress had two main goals: provide some oversight where there was none, and draw clear lines so that law enforcement would know when it could use foreign intelligence process and when it had to follow ordinary criminal process. To address these goals, FISA contains two important parts. First, it established a framework for judicial review by creating the Foreign Intelligence Surveillance Court and the Foreign Intelligence Surveillance Court of Review. It also created a new FISA process to replace criminal process such as warrants, subpoenas, surveillance orders, and pen register/trap and trace orders. The FISA versions of each of these has less stringent requirements for the government to satisfy than criminal process. See 50 U.S.C. § 1801–12 (electronic surveillance equivalent to Title III orders), 50 U.S.C. § 1821–29 (physical searches like search warrants), 50 U.S.C. § 1841–46 (pen registers and trap-and-trace devices), 50 U.S.C. § 1861–62 (business records like grand jury subpoenas).

Second, FISA addressed when law enforcement can and cannot use these FISA processes to conduct surveillance or gather evidence. As it was originally enacted, law enforcement could obtain FISA process, rather than criminal process, when the “primary purpose” of surveillance was to gather foreign intelligence information. At the same time, Congress explicitly excluded activities conducted abroad from FISA’s reach. It also did not provide protection for U.S. citizens when they left the United States. See H.R. Rep. No. 95–1283, at 51 (1978).

To fill in the gaps FISA left and to provide rules of executive branch intelligence agencies, President Reagan issued Executive Order 12,333, United States Intelligence Activities (46 Fed. Reg. 59,941 (Dec. 4, 1981)). That order (as amended) remains the basis for executive branch surveillance for foreign intelligence purposes. What is important is that the order sets forth procedures that apply where FISA did not, specifically for surveillance of United States persons located abroad. Id. § 2.5.

Foreign intelligence gathering continued under FISA and Executive Order 12,333 for nearly two decades without major revision or challenge, until the attacks of September 11, 2001. Following 9/11, Congress passed the USA Patriot Act, which amended FISA by expanding law enforcement authority and lowering the standards required to obtain surveillance authority. Pub. L. No. 107–56 (H.R. 3162), 115 Stat. 272 (2001). The act eliminated the “primary purpose” test and replaced it with a “significant purpose” test. Id. § 218. The “primary purpose” test led law enforcement to create a wall between agencies that engaged in criminal prosecutions (such as parts of the Federal Bureau of Investigation and the Department of Justice) and agencies that primarily engaged in foreign intelligence gathering (such as the NSA). One of the problems identified in the aftermath of 9/11 was a reluctance to share information because of this “primary purpose” rule—and the fear that doing so could put surveillance or criminal prosecutions at risk.

In a rare published decision (there have been only two), the FISCR upheld the “significant purpose” test in In re Sealed Case, 310 F.3d 717 (FISA Ct. Rev. 2002). The FISC court had found that the “significant purpose” standard was lower than the “primary purpose” standard but that the Fourth Amendment did not require more. The court concluded that the procedures and government showings required under FISA, even if they do not meet the warrant requirement, come close enough that FISA as amended by the Patriot Act meets the balancing test between Fourth Amendment rights and the need to protect against national security threats. In re Sealed Case would prove to be a launching point for reconciling FISA with the Fourth Amendment and for chipping away at the warrant requirement for foreign intelligence-gathering purposes.

In December 2005, a New York Times article revealed a warrantless domestic wiretapping program, the Terrorist Surveillance Program (TSP), in which the NSA was allowed to eavesdrop on communications where at least one party was not a United States person. According to reports, technical glitches resulted in some “purely domestic” communications being subject to surveillance. The surveillance was based on a 2002 executive order that allowed the NSA to monitor international email messages and international telephone calls transmitted by communications networks based in the United States—surveillance that was outside the scope of review in In re Sealed Case. That executive order claimed that FISA’s warrant requirements were implicitly superseded by the passage of the congressional resolution authorizing the use of military force against terrorists and that the president’s inherent authority under Article II of the Constitution to conduct foreign surveillance trumped FISA.

A group of plaintiffs sought to challenge the TSP in American Civil Liberties Union v. National Security Agency, 438 F. Supp. 2d 754 (E.D. Mich. 2006). The district court ruled that the surveillance violated the Fourth Amendment, finding that the TSP was implemented without regard to the Fourth Amendment or to FISA, and thus violated FISA, the standards of Title III, and the Fourth Amendment. On appeal, however, the Sixth Circuit dismissed the case, finding that the plaintiffs lacked standing to challenge the TSP because they had not alleged that they were the actual victims of warrantless surveillance. ACLU v. NSA, 493 F.3d 644 (6th Cir. 2007); see also Clapper v. Amnesty Int’l, 133 S. Ct. 1138 (2013).

The Protect America Act of 2007

Following the public outcry in response to the New York Times article and the ACLU decision, the Bush administration proposed the Protect America Act of 2007 (PAA), Pub. L. No. 110-55, 121 Stat. 552, which was designed to address surveillance of communications facilities located in the United States that transmit communications between individuals both of whom are located abroad. PAA § 105A. Again, just as in 1978, the government needed more guidance on when FISA applied and when the executive branch was free of its requirements. The PAA addressed a new problem: capturing wholly foreign communications on U.S. soil. In the past, to capture foreign communications between non-U.S. persons, the government simply implemented surveillance on foreign communications networks, which are not subject to restrictions imposed by the Fourth Amendment or any statute. Now that foreign communications could be transferred within the United States and the TSP’s constitutionality had been called into doubt, the intelligence community required a new tool to continue that surveillance. The PAA, by providing a number of procedures to conduct surveillance of targets outside the United States, and in an attempt to avoid resort to traditional warrants and Title III orders, implemented a system of internal controls at the NSA as well as overarching review of policies and procedures by the FISC. The PAA was a stopgap measure, to preserve some aspects of warrantless surveillance of foreign communications transmitted within the United States while Congress worked to overhaul FISA.

Notably, the PAA, like the Patriot Act, again changed the test of when the FISA process does and does not apply. The PAA changed the focus from the identity of the party targeted to whether a party was present in the United States. This change made it much simpler for the attorney general and the director of national intelligence to approve surveillance—rather than certifying that both parties to the communication were foreign powers or agents of foreign powers, they now only had to certify that the target of the surveillance was located outside the United States. Under the PAA, the director of national intelligence and the attorney general could permit, for up to one year, “the acquisition of foreign intelligence information concerning persons reasonably believed to be outside the United States” if they determined that the acquisition met five specified criteria and the minimization procedures for that surveillance were approved by the FISC. PAA § 105B. In practical terms, the government could serve providers with orders that the FISC approved, and then name the targets of surveillance later.

One provider, Yahoo, challenged this in In re Directives [Redacted] Pursuant to Section 105B of the Foreign Intelligence Surveillance Act [Redacted], 551 F.3d 1004 (FISA Ct. Rev. 2008). In that case, the government revealed that it not only complied with the PAA but also voluntarily complied with Executive Order 12,333, 46 Fed. Reg. 59,941, 59,951 (Dec. 4, 1981), which taken together mean that the certifications at issue “permit surveillances conducted to obtain foreign intelligence for national security purposes when those surveillances are directed against foreign powers or agents of foreign powers reasonably believed to be located outside the United States.” In re Directives, 551 F.3d at 1008. The court upheld these warrantless searches, finding that because the purpose of the surveillance was to gather foreign intelligence information, it fell under a “foreign intelligence exception to the Fourth Amendment’s warrant requirement” so long as it was directed against foreign powers or agents of foreign powers reasonably believed to be located outside the United states. Id. at 1012.

The court also found that the searches were reasonable because they complied with Executive Order 12,333, which required probable cause to believe that an individual is outside the United States and a finding that such surveillance was necessary, and which limited the duration of the surveillance and thus contained sufficient protections to avoid risk of mistake or executive branch misconduct.

The PAA was a stopgap measure and was eventually replaced by the FISA Amendments Act of 2008 (FAA), Pub. L. No. 110-261, § 403, 122 Stat. 2436, 2473. The FAA repealed the most troublesome provision of the PAA, which provided for warrantless surveillance of foreign intelligence targets “reasonably believed” to be outside the United States, even if they were U.S. persons, by adding a new section to FISA entitled “Additional Procedures Regarding Certain Persons Outside the United States.” Much of this section enshrines the protections present in Executive Order 12,333’s treatment of U.S. persons that the court relied on in In re Sealed Case and In re Directives to uphold the surveillance of United States persons located abroad.

The FAA again addressed the question of when FISA applies via a complicated web of procedures and processes for each category of target subject to surveillance: individuals outside the country that are not “U.S. Persons” (section 1881a), acquisitions inside the country targeting U.S. persons outside the country (section 1881b), and U.S. persons outside the country (section 1881c). Different processes are required for each type of target, but in a nutshell, U.S. persons receive slightly more protection. The most important change is that there is no prior judicial review of surveillance conducted in the United States that targets non-U.S. persons located outside the United States. FAA § 1881a. To conduct surveillance of U.S. persons outside the United States, however, the government must first obtain FISC approval of the particular targets. FAA § 1881b.

 

Time to Address Problems

FISA’s history and current events demonstrate that we are at a point in the cycle where it is again time to address the two basic questions: How do we provide oversight of intelligence-gathering activities? And when does this oversight apply? FISA, from a textual perspective, provides the government with far-reaching authority for surveillance and specific process for each type of surveillance it may want to conduct, but the public was relatively unaware of how the government used that authority until Edward Snowden leaked classified documents in late 2013 providing some detail on the NSA’s use of surveillance activities. In response, the government has begun declassifying a wealth of FISC decisions, letters to Congress, and other information regarding the NSA’s use of FISA authorities. A detailed analysis of these opinions could lead to a new report as voluminous as the Church Committee’s reports, but even a high-level analysis provides some context for moving forward.

The recently released opinions—such as Redacted, LEXIS 157706 (FISA Ct. Oct. 3, 2011), and Redacted II, LEXIS 157706 (FISA Ct. Nov. 30, 2011)—confirm what appeared to be the case in In re Directives, that the FISC has adopted an exception to the warrant requirement for foreign intelligence gathering—particularly where the government seeks communications that are not wholly domestic. In those cases, despite finding that the NSA knowingly collected wholly domestic communications that had nothing to do with foreign intelligence, the FISC generally approved most of the government’s targeting and minimization procedures. On a bad set of facts for the government, the FISC held that only a small part of the NSA’s surveillance program was unconstitutional and only because the NSA did not make enough of an effort to delete wrongly collected communications—a problem the NSA soon remedied. Redacted II, LEXIS 157705 (FISA Ct. Nov. 30, 2011).

The window left open in Keith seems to be closed. Similarly, the FISC has approved of the NSA’s “collect now, restrict searching later” approach to minimization. See In re Application of the F.B.I. for an Order Requiring the Production of Tangible Things from [Redacted], No. BR 13-109, LEXIS 134786 (FISA Ct. Sept. 13, 2013). In other words, the FISC has found no constitutional or statutory impediment to the government “over collecting” data—so long as it does not intentionally collect wholly domestic communications and it has minimization procedures to restrict access. There is no indication that the government has used its surveillance powers improperly (except in a limited number of circumstances attributable to NSA employee misconduct), but the FISC has not taken a robust view of the Fourth Amendment.

As was the case back in the late 1970s, the American public has reacted to executive surveillance activities—some of which are eerily similar to the NSA’s use of surveillance authority in the mid– to late 1970s. And as was the case in the late 1970s, it may again be time for Congress to take action. The problems remain quite similar to those Congress faced in 1978: provide oversight where there is none, or where it is inadequate, and make clear when the government can, and cannot, use different types of FISA process.

In late 2013, numerous members of Congress began proposing bills to reform FISA and provide new protections. See Mark M. Jaycox, “Cheat Sheet to Congress’ NSA Spying Bills,” Elec. Frontier Found. (Sept. 11, 2013), http://www.eff.org/deep links/2013/08/effs-cheat-sheet. Given the heated nature of the current debate, it is likely that the particular content of these bills will change daily, and summarizing their particularities is best left to blogs. Still, the bills generally fall into two categories: increasing transparency and restructuring the process. A few bills address bulk collection of records under section 215, but none takes a comprehensive approach to changing the question of when FISA applies and when it does not.

The current system of checks and balances under the FAA is simply not enough. It’s not because of a lack of desire by the providers to defend their users. Unlike the telephone and telegraph companies that did not act to end NSA spying in the Operation SHAMROCK era, providers today are taking a much more active role in the process. Yahoo challenged the FISA process in 2008, interest groups have filed actions seeking information about surveillance practices, and now providers have brought declaratory judgment actions seeking to reveal more information about surveillance process they receive.

One of the pending bills, Senator Blumenthal’s FISA Court Reform Act of 2013, Senate Bill 1460 and Senate Bill 1467, provides an answer that, having had the experience of litigating before the FISC myself, I believe could provide much needed improvements. That bill provides for a new Office of the Special Advocate, which introduces an adversary to the court. (This is similar to the public privacy advocate that President Obama recently proposed.) The act attempts to solve a basic problem with the current oversight procedures: There is no true adversarial process for most of the legal issues that arise. The newly declassified opinions the director of national intelligence has released make this abundantly clear. Setting aside the legal arguments, the procedural history of the opinions indicates delays on the government’s part, a lack of supervision after the court issues its orders, and a preference for secrecy over public disclosure at any cost. Appointing a special advocate ad litem for the public would ensure that novel legal arguments in the FISA court would face a consistent, steady challenge no matter who the provider is, thereby strengthening the FISA process by subjecting results to checks and balances.

Without such a process, the court and the Department of Justice must work through difficult legal issues with no balancing input. An advocate could participate in all cases involving a new statute or authority or a new interpretation or application of an existing authority. The special advocate could choose the cases in which to be involved, or the court or a provider that receives process could request its involvement where an opposition would be useful to test and evaluate the government’s legal arguments. The special advocate’s office could be established with proper security safeguards to draft, store, and access classified records more efficiently. It could also be required to report to the public and Congress the number of cases it has argued and how often it has limited or pared back the government’s requests. It would provide a vital counterpoint for legislators exercising their oversight duties.

The special advocate would be especially useful in cases in which the government demands access to communications in a way that may have a profound effect on people other than the target, such as when decryption may be involved or when a provider is asked to provide assistance in ways that are unlike traditional wiretaps.

Providing for an advocate in front of the court would also resolve several problems for companies and individuals faced with receiving FISA process or having evidence gathered using that process used against them. The statutory process as it stands now does not necessarily provide for complete transparency or a level playing field for the provider. As the published decision in In re Directives makes clear, a phalanx of 11 government lawyers, including the acting solicitor general of the United States, was involved in defending the statute. The decision also shows that some of the documents relied on by the court of review were classified procedures submitted as part of an ex parte appendix that remains sealed. 551 F.3d at 1013–14.

If an advocate were present in other matters before the FISC, the government and court would be more likely to provide more public information on what challenges have and have not been successful. Public access would also provide litigators with a much greater opportunity to use those challenges in advising and defending their clients. The FISC’s decisions may or may not have been correct, depending on your view, but the secrecy employed up to this point erodes the safeguards built into our adversarial court system. The presence of an advocate would help to ensure that the government cannot continue to keep new opinions classified, unless it is truly in the interest of national security to do so.

Revising FISA is no easy task, and analyzing and responding to the FISA process presents thorny questions. There is one constant throughout the history of surveillance, as was the case in the Church Report and as is the case today with news reports about NSA surveillance: The government will use the surveillance power it is given to its fullest. This article does not opine on when that is and is not appropriate. America’s long history of surveillance and current events demonstrate a need to revise the process and take a hard look at whether courts have the tools to oversee executive branch surveillance and when the executive branch should be allowed to use foreign intelligence procedures. Introducing an advocate to test the government’s theories and surveillance in every case—even the ones it brings ex parte—would go a long way toward ensuring that the American public is not shocked again.

https://www.americanbar.org/publications/litigation_journal/2013-14/spring/fisa_authority_and_blanket_surveillance_gatekeeper_without_opposition.html

Meet Executive Order 12333: The Reagan rule that lets the NSA spy on Americans

July 18, 2014

John Napier Tye served as section chief for Internet freedom in the State Department’s Bureau of Democracy, Human Rights and Labor from January 2011 to April 2014. He is now a legal director of Avaaz, a global advocacy organization.

In March I received a call from the White House counsel’s office regarding a speech I had prepared for my boss at the State Department. The speech was about the impact that the disclosure of National Security Agency surveillance practices would have on U.S. Internet freedom policies. The draft stated that “if U.S. citizens disagree with congressional and executive branch determinations about the proper scope of signals intelligence activities, they have the opportunity to change the policy through our democratic process.”

But the White House counsel’s office told me that no, that wasn’t true. I was instructed to amend the line, making a general reference to “our laws and policies,” rather than our intelligence practices. I did.

Even after all the reforms President Obama has announced, some intelligence practices remain so secret, even from members of Congress, that there is no opportunity for our democracy to change them.

Public debate about the bulk collection of U.S. citizens’ data by the NSA has focused largely on Section 215 of the Patriot Act, through which the government obtains court orders to compel American telecommunications companies to turn over phone data. But Section 215 is a small part of the picture and does not include the universe of collection and storage of communications by U.S. persons authorized under Executive Order 12333.

From 2011 until April of this year, I worked on global Internet freedom policy as a civil servant at the State Department. In that capacity, I was cleared to receive top-secret and “sensitive compartmented” information. Based in part on classified facts that I am prohibited by law from publishing, I believe that Americans should be even more concerned about the collection and storage of their communications under Executive Order 12333 than under Section 215.

Bulk data collection that occurs inside the United States contains built-in protections for U.S. persons, defined as U.S. citizens, permanent residents and companies. Such collection must be authorized by statute and is subject to oversight from Congress and the Foreign Intelligence Surveillance Court. The statutes set a high bar for collecting the content of communications by U.S. persons. For example, Section 215 permits the bulk collection only of U.S. telephone metadata — lists of incoming and outgoing phone numbers — but not audio of the calls.

Executive Order 12333 contains no such protections for U.S. persons if the collection occurs outside U.S. borders. Issued by President Ronald Reagan in 1981 to authorize foreign intelligence investigations, 12333 is not a statute and has never been subject to meaningful oversight from Congress or any court. Sen. Dianne Feinstein (D-Calif.), chairman of the Senate Select Committee on Intelligence, has said that the committee has not been able to “sufficiently” oversee activities conducted under 12333.

Unlike Section 215, the executive order authorizes collection of the content of communications, not just metadata, even for U.S. persons. Such persons cannot be individually targeted under 12333 without a court order. However, if the contents of a U.S. person’s communications are “incidentally” collected (an NSA term of art) in the course of a lawful overseas foreign intelligence investigation, then Section 2.3(c) of the executive order explicitly authorizes their retention. It does not require that the affected U.S. persons be suspected of wrongdoing and places no limits on the volume of communications by U.S. persons that may be collected and retained.

“Incidental” collection may sound insignificant, but it is a legal loophole that can be stretched very wide. Remember that the NSA is building a data center in Utah five times the size of the U.S. Capitol building, with its own power plant that will reportedly burn $40 million a year in electricity.

“Incidental collection” might need its own power plant.

A legal regime in which U.S. citizens’ data receives different levels of privacy and oversight, depending on whether it is collected inside or outside U.S. borders, may have made sense when most communications by U.S. persons stayed inside the United States. But today, U.S. communications increasingly travel across U.S. borders — or are stored beyond them. For example, the Google and Yahoo e-mail systems rely on networks of “mirror” servers located throughout the world. An e-mail from New York to New Jersey is likely to wind up on servers in Brazil, Japan and Britain. The same is true for most purely domestic communications.

Executive Order 12333 contains nothing to prevent the NSA from collecting and storing all such communications — content as well as metadata — provided that such collection occurs outside the United States in the course of a lawful foreign intelligence investigation. No warrant or court approval is required, and such collection never need be reported to Congress. None of the reforms that Obama announced earlier this year will affect such collection.

Without any legal barriers to such collection, U.S. persons must increasingly rely on the affected companies to implement security measures to keep their communications private. The executive order does not require the NSA to notify or obtain consent of a company before collecting its users’ data.

The attorney general, rather than a court, must approve “minimization procedures” for handling the data of U.S. persons that is collected under 12333, to protect their rights. I do not know the details of those procedures. But the director of national intelligence recently declassified a document (United States Signals Intelligence Directive 18) showing that U.S. agencies may retain such data for five years.

Before I left the State Department, I filed a complaint with the department’s inspector general, arguing that the current system of collection and storage of communications by U.S. persons under Executive Order 12333 violates the Fourth Amendment, which prohibits unreasonable searches and seizures. I have also brought my complaint to the House and Senate intelligence committees and to the inspector general of the NSA.

I am not the first person with knowledge of classified activities to publicly voice concerns about the collection and retention of communications by U.S. persons under 12333. The president’s own Review Group on Intelligence and Communication Technologies, in Recommendation 12 of its public report, addressed the matter. But the review group coded its references in a way that masked the true nature of the problem.

At first glance, Recommendation 12 appears to concern Section 702 of the FISA Amendments Act, which authorizes collection inside the United States against foreign targets outside the United States. Although the recommendation does not explicitly mention Executive Order 12333, it does refer to “any other authority.” A member of the review group confirmed to me that this reference was written deliberately to include Executive Order 12333.

Recommendation 12 urges that all data of U.S. persons incidentally collected under such authorities be immediately purged unless it has foreign intelligence value or is necessary to prevent serious harm. The review group further recommended that a U.S. person’s incidentally collected data never be used in criminal proceedings against that person, and that the government refrain from searching communications by U.S. persons unless it obtains a warrant or unless such searching is necessary to prevent serious harm.

The White House understood that Recommendation 12 was intended to apply to 12333. That understanding was conveyed to me verbally by several White House staffers, and was confirmed in an unclassified White House document that I saw during my federal employment and that is now in the possession of several congressional committees.

In that document, the White House stated that adoption of Recommendation 12 would require “significant changes” to current practice under Executive Order 12333 and indicated that it had no plans to make such changes.

All of this calls into question some recent administration statements. Gen. Keith Alexander, a former NSA director, has said publicly that for years the NSA maintained a U.S. person e-mail metadata program similar to the Section 215 telephone metadata program. And he has maintained that the e-mail program was terminated in 2011 because “we thought we could better protect civil liberties and privacy by doing away with it.” Note, however, that Alexander never said that the NSA stopped collecting such data — merely that the agency was no longer using the Patriot Act to do so. I suggest that Americans dig deeper.

Consider the possibility that Section 215 collection does not represent the outer limits of collection on U.S. persons but rather is a mechanism to backfill that portion of U.S. person data that cannot be collected overseas under 12333.

Proposals for replacing Section 215 collection are currently being debated in Congress. We need a similar debate about Executive Order 12333. The order as used today threatens our democracy. There is no good reason that U.S. citizens should receive weaker privacy and oversight protections simply because their communications are collected outside, not inside, our borders.

I have never made any unauthorized disclosures of classified information, nor would I ever do so. I fully support keeping secret the targets, sources and methods of U.S. intelligence as crucial elements of national security. I was never a disgruntled federal employee; I loved my job at the State Department. I left voluntarily and on good terms to take a job outside of government. A draft of this article was reviewed and cleared by the State Department and the NSA to ensure that it contained no classified material.

When I started at the State Department, I took an oath to protect the Constitution of the United States. I don’t believe that there is any valid interpretation of the Fourth Amendment that could permit the government to collect and store a large portion of U.S. citizens’ online communications, without any court or congressional oversight, and without any suspicion of wrongdoing. Such a legal regime risks abuse in the long run, regardless of whether one trusts the individuals in office at a particular moment.

I am coming forward because I think Americans deserve an honest answer to the simple question: What kind of data is the NSA collecting on millions, or hundreds of millions, of Americans?

https://www.washingtonpost.com/opinions/meet-executive-order-12333-the-reagan-rule-that-lets-the-nsa-spy-on-americans/2014/07/18/93d2ac22-0b93-11e4-b8e5-d0de80767fc2_story.html?utm_term=.0be4d4e8beac

A Primer on Executive Order 12333: The Mass Surveillance Starlet

JUNE 2, 2014

Many news reports have focused on Section 215 of the Patriot Act (used to collect all Americans’ calling records) and Section 702 of the Foreign Intelligence Surveillance Act Amendments Act (FAA) (used to collect phone calls, emails and other Internet content) as the legal authorities supporting much of the NSA’s spying regime. Both laws were passed by Congress and are overseen by the Foreign Intelligence Surveillance Court (FISA court). However, it’s likely that the NSA conducts much more of its spying under the President’s claimed inherent powers and only governed by a document originally approved by President Reagan titled Executive Order 12333. The Senate Select Committee on Intelligence is currently conducting a secret investigation into the order, but Congress as a whole—including the Judiciary committee—must release more information about the order to the public.

EO 12333 was first written in 1981 in the wake of Watergate and the Foreign Intelligence Surveillance Act, an act passed by Congress that regulates spying conducted on people located within the United States. Since FISA only covers specific types of spying, the President maintains that the executive branch remains free to spy abroad on foreigners with little to no regulation by Congress.

Executive Order 12333

The Executive Order does three things: it outlines what it governs, when the agencies can spy, and how they can spy. In broad strokes, the Executive Order mandates rules for spying on United States persons (a term that includes citizens and lawful permanent residents wherever they may be) and on anyone within the United States. It also directs the Attorney General and others to create further policies and procedures for what information can be collected, retained, and shared.

The first section of the order covers the role of every agency conducting intelligence in the Intelligence Community, which includes seventeen different agencies, including well-known entities like the Central Intelligence Agency (CIA) and the NSA, and lesser-known entities like the Office of Terrorism and Financial Intelligence in the Department of Treasury. The roles vary by agency. For instance, the NSA is, among other things, responsible for “collection, processing and dissemination of signals intelligence,” while the CIA is responsible for “national foreign intelligence.

The Information Collected

The Executive Order purports to cover all types of spying conducted with the President’s constitutional powers—including mass spying. That’s important to note because some of the spying conducted under EO 12333 is reportedly similar to the mass spying conducted under Section 702 of the FAA. Under this type of spying, millions of innocent foreigners’ communications are collected abroad, inevitably containing Americans’ communications. In the Section 702 context, this includes techniques like Prism and Upstream. While we don’t know for sure, the Executive Order probably uses similar techniques or piggybacks off of programs used for Section 702 spying.

The second section of the EO partly covers mass spying by establishing what information intelligence agencies can collect, retain, and share about US persons. The current guidelines, the United States Signals Intelligence Directive SP0018, also known as “USSID 18,” are (just like the “minimization procedures” based off of them) littered with loopholes to over-collect, over-retain, and over-share Americans’ communications—all without a probable cause warrant or any judicial oversight.

Defenders (.pdf) of the mass spying conducted under the Executive Order point out the order “protects” such US person information with guidelines like USSID 18, but such protections are window-dressing, at best. Policies like USSID 18 and other accompanying Executive Order guidelines such as the “Special Procedures Governing Communications Metadata Analysis” allow for extensive use of US person information and data without a probable cause warrant. Indeed, news reports and Congressional testimony confirm the “Special Procedures” are used to map Americans’ social networks. The procedures are clear evidence the government believes that Fourth Amendment’s protections stop at the border.

Uses of Executive Order 12333

We do know a little about the spying conducted using EO 12333, but more must be revealed to the public. One early news report revealed it was the NSA’s claimed authority for the collection of Americans’ address books and buddy lists. It’s also involved in the NSA’s elite hacking unit, the Tailored Access Operations unit, which targets system administrators and installs malware while masquerading as Facebook servers. And in March, the Washington Postrevealed the order alone—without any court oversight—is used to justify the recording of “100 percent of a foreign country’s telephone calls.” The NSA’s reliance on the order for foreign spying includes few, if any, Congressional limits or oversight. Some of the only known limits on Executive spying are found in Executive procedures like USSID 18, the metadata procedures discussed above, and probably other still-classified National Security Policy Directives, none of which have been publicly debated much less approved by Congress or the courts.

The extent of the NSA’s reliance on Executive Order 12333 demands that the government release more information about how the order is used, or misused. And Congress—specifically the Judiciary and Intelligence committees—must reassert the same aggressive and diligent oversight they performed in the 1970s and 1980s.

https://www.eff.org/deeplinks/2014/06/primer-executive-order-12333-mass-surveillance-starlet

Maintaining America’s Ability to Collect Foreign Intelligence: The Section 702 Program

May 13, 2016 21 min read Download Report

Authors:Paul Rosenzweig, Charles Stimson andDavid Shedd

Select a Section 1/0

Section 702 of the Foreign Intelligence Surveillance Act (FISA) will, in its current form, come up for reauthorization in 2017. Broadly speaking, the Section 702 program targets non-U.S. persons reasonably believed to be located outside the United States, in order to acquire foreign intelligence. Over the past several years, this surveillance of the online activities of foreigners has been a critical and invaluable tool for American intelligence professionals and officials. Knowledgeable officials note that more than 25 percent of all current U.S. intelligence is based on information collected under Section 702.[1]

Still, there are those who have concerns about the program. These critics believe that the program, as currently implemented, infringes on Americans’ rights. Their concern hinges on the inevitable reality that in the course of collecting information about foreign actors, the Section 702 program will also collect information about American citizens. As a result, some opponents liken the Section 702 program to the government telephony metadata program disclosed by Edward Snowden, and characterize Section 702 as an instance of government overreach.[2] Such comparisons are misguided and unfair. The program is so vital to America’s national security that Congress should reauthorize Section 702 in its current form.

Section 702 Explained

Section 702 has its origins in President George W. Bush’s terrorist surveillance program and the Patriot Act. That program was initiated in the immediate aftermath of the 9/11 terror attacks, on the President’s own authority. That reliance on exclusive presidential authority contributed to the controversy that initially attended the program—some vocal critics saw it as an example of executive overreach.

Dear reader:

The Heritage Foundation is a non-profit conservative policy organization with more than 100 dedicated policy experts conducting independent, high-quality research on the most important issues facing America. Our work is funded solely by the financial support of the general public.

  • Heritage provides our policy analysis directly to lawmakers and the American people
  • More than 500,000 Americans donate to support Heritage’s work
  • Heritage does not accept government funds

Please donate to ensure we can win the war of ideas and bring more Americans into the conservative fold.

If you rely on The Heritage Foundation for policy analysis like this on important issues, please take one minute to help make a difference. Your donation will ensure that Heritage can continue to provide our innovative research and insights to the American people and their representatives in government.

Thank you.

Win the War of Ideas

That aspect of the criticism was significantly ameliorated, if not eliminated, several years later, when Congress fully discussed and authorized the activities in question. Indeed, the governing law was adopted and amended twice, after the program had been initiated on the President’s own authority. First, Congress adopted a temporary measure known as the Protect America Act in 2007.[3] Then, it passed the FISA Amendments Act (FAA) in 2008. This is the statute that includes the new Section 702.[4]

Under Section 702, the U.S. Attorney General and the Director of National Intelligence (DNI) may jointly authorize surveillance of people who are not “U.S. persons.” U.S. persons is a term of art in the intelligence community (IC) that means people who are not only American citizens but also covers permanent-resident aliens. As such, the targets of Section 702 surveillance can be neither citizens nor permanent residents of the U.S.

Section 702 authorizes the government to acquire foreign intelligence by targeting non-U.S. persons “reasonably believed” to be outside U.S. borders. Taken together, these two requirements identify the fundamental domain of Section 702 surveillance: it applies to foreigners on foreign soil. It is expressly against the law to attempt collection of information from targets inside the U.S.—whether Americans or foreigners—or to deliberately target the collection of online communications of American citizens.[5]

The law also requires the government to develop “targeting procedures”—the steps the government needs to take in order to ensure that the target is outside the United States at any time that electronic surveillance is undertaken. Obviously, that is sometimes difficult. A cell phone number, for instance, remains the same whether the phone is physically overseas or in the U.S., and the fact that someone has a U.S. cell phone number does not necessarily indicate whether the owner or user of that cell phone is a foreigner or an American. Hence, targeting must be tied to the geolocation of a phone and some knowledge about the owner/user, rather than solely to the phone’s number. Ultimately, it is the targeting procedures, not the targets themselves, that must be approved by the U.S. Foreign Intelligence Surveillance Court (FISC).[6]

To conduct this surveillance, the government can compel assistance from Internet service providers (ISPs) and telephone companies in acquiring foreign intelligence information—that is, information relating to a foreign espionage program or international terrorism. The government often compensates these providers for the necessary effort. According to The Washington Post, the payments range from $250 million to nearly $400 million annually.[7] Some critics of the program suspect that as a result, surveillance turns from a legal obligation to a source of income. Finally, it is important to note that not only regulated carriers, such as traditional cable and telephone companies (such as AT&T or Verizon), are required to participate, but also newer technology companies to include Google, Facebook, and Skype.

The Incidental Collection Issue

If that were all that the 702 program involved, it would likely not be particularly controversial. Few Americans have expressed grave concerns about America’s overseas intelligence collection. Significantly, the 702 program cannot be used to target any U.S. person or any person located in the U.S., whether that person is an American or a foreigner. The government is also prohibited from “reverse targeting” under 702—that is, the government cannot target a non-U.S. person outside the U.S. when the real interest is to collect the communications of a person in the U.S. or of any U.S. person, regardless of location.

But a residual issue arises because of the inevitability of inadvertent collection—the incidental collection of information about Americans as part of the authorized collection of foreign intelligence.

To see why this happens, one needs to understand two distinct aspects of the Section 702 program: one portion that goes by the name of PRISM, and another that is referred to colloquially as “upstream collection.”[8]

PRISM collection is relatively straightforward. A hypothetical can explain: The government has information about a particular e-mail address, or a particular individual, linking it or him to a foreign terrorist organization. That address (john.doe@xyz.com) or that individual’s name (John Doe) is known as a “selector”; it is a basis for sifting through vast quantities of data, and selecting what will be collected and analyzed.

The Attorney General and the DNI certify the selector as relating to a non-U.S. person who is outside the United States, and who is reasonably believed to be connected to a foreign intelligence activity. Then, the National Security Agency (NSA) sends a query about that selector to an ISP. The ISP, in turn, is required to hand over to the government any communications it might have that were sent to—or from—the identified selector. The NSA receives all data collected through PRISM, and makes portions of it available to the CIA and the FBI.

Upstream collection, by contrast, does not focus on the ISP. Instead, it focuses on the “backbone,” through which all telephone and Internet communications travel, which lies “upstream” within the telecommunications infrastructure. For example, an individual’s ISP might be a local company, while the backbone that carries its Internet traffic across the ocean to Europe is almost certainly operated by a larger provider, such as Verizon or AT&T.

There are several additional differences that distinguish upstream collection from PRISM. Most notably, upstream collection can involve “about” communications. “About” communications refer to selectors that occur within the content of the monitored communication, instead of, in the example of e-mail, in the “To” or “From” line.

So, if the government were using a name—John Doe—as a selector, under the upstream collection program, it would also collect foreign intelligence–related communications in which that name appeared in the body of the communication. Say, for example, that two al-Qaeda members are communicating via e-mail, and one says to the other: “We should recruit Doe.” That e-mail would be subject to upstream collection and would be a good example of an “about” communication. The e-mail is about Doe. Under the PRISM program, by contrast, the government would collect e-mails to and from the user name, and nothing more.

As should be evident, in some cases, these programs might result unintentionally in the collection of information about an American. If two Americans are communicating domestically in an exchange that names a foreign intelligence target (say, an e-mail that mentions an al-Qaeda operative by name), that e-mail might be incidentally collected by upstream collection. Likewise, an e-mail between two terrorist targets might be collected that incidentally includes information not only about legitimately identified U.S. persons (the recruit target John Doe), but also others. An e-mail might also mention Mary Doe—even though no evidence exists of any connection between Mary Doe and a foreign intelligence matter.

This prospect of collecting American data led Congress to include certain requirements that would reduce, though not entirely eliminate, the possibility that the data could be misused. Under the FAA, when information is collected about an American, whether incidentally as part of an authorized investigation, or inadvertently as the result of a mistake, the government is required to apply FISC-approved “minimization” procedures to determine whether such information may be retained or disseminated.

When lawyers and intelligence professionals use the word “minimization” in the context of intelligence collection, it means that any information inadvertently collected on a U.S. person is retained (if at all) only for a limited time, and that information about Americans is used and revealed and further disseminated only under narrowly defined circumstances. Minimization requirements may also mean deleting the information entirely. As with the targeting procedures, these minimization procedures are approved by the FISC—but again, the approval is for the entire system of minimization, not for each individual case.

So, for example, under these minimization rules, the NSA, CIA, and FBI are subject to certain limitations in how they are permitted to query and analyze the data they have lawfully collected. For example, they must demonstrate a reasonable likelihood that targeting a particular item in the information collected will result in the development of foreign intelligence. In other words, the rules limit when a U.S. person can be targeted for examination, and how long data about an American can be retained before it is deleted.

The Effectiveness of Section 702

With that background in mind, it is useful to turn to more practical questions about the program: Does it work? Is it being abused?

The public record suggests that the Section 702 program has indeed helped in the fight against terrorism. Classified records might provide additional support for this conclusion but they are unavailable to us.[9] The Privacy and Civil Liberties Oversight Board (PCLOB)—a bipartisan panel in the executive branch that reviews actions the executive branch takes to protect the country from terrorism, and also monitors civil liberty concerns—has reported that more than one-quarter of NSA reports on international terrorism include information that is based in whole, or in part, on data collected under the Section 702 program.

The PCLOB found that the 702 program “makes a substantial contribution to the government’s efforts to learn about the membership, goals, and activities of international terrorist organizations, and to prevent acts of terrorism from coming to fruition.”[10] Additionally, the program has “led the government to identify previously unknown individuals who are involved in international terrorism, and it has played a key role in discovering and disrupting specific terrorist plots aimed at the United States and other countries.”[11]

Although the details supporting these findings are classified, the board has also said that the program has played a role in discovering, and disrupting, specific terrorist plots aimed at the United States by enabling the government to identify previously unidentified individuals involved in international terrorism.[12] Additionally, the U.S. House of Representatives Permanent Select Committee on Intelligence (HPSCI) has posted three declassified examples from the NSA that involved the effective use of Section 702 collection in 2009: the New York City Subway Attack Plot; the Chicago Terror Investigation; and Operation Wi-Fi.

A few critics of the 702 program have disputed its actual impact in the New York City Subway Attack Plot and the Chicago Terror Investigation. TheGuardian interviewed several people who were involved in the two investigations and reviewed U.S. and British court documents.[13] Based on this incomplete record, The Guardian concluded that these investigations began with “conventional” surveillance methods—such as “old-fashioned tip-offs” of the British intelligence services—rather than from leads produced by NSA surveillance.

But the fact remains that current and former intelligence officials, members from both political parties across two Administrations, national security law experts in the private sector, and the PCLOB maintain that 702 has been and continues to be a very important intelligence tool for overseas intelligence collection.

Section 702 Criticisms v. Facts

Some of the criticisms of Section 702 are little more than philosophical objections to the concept of overseas surveillance.

Setting aside those concerns, there are other specific criticisms, each of which lacks merit. For example, there has been criticism that there is no significant publicly available data on how little, or how much, incidental collection there is about U.S. persons. Such data would be helpful to know in assessing the program. According to the PCLOB, in 2013 the NSA approved 198 U.S. person identifiers to be used as content query terms. The real issue is the frequency with which U.S. persons’ information was collected incidentally to the general foreign intelligence mission, and what is done with the information. After all, if the volume of incidental collection even remotely came close to what is collected as useful data on terrorism activities, including threats, skepticism about Section 702’s efficacy would be warranted.

Given that the targets of Section 702 collection are non-U.S. persons reasonably believed to be located overseas, it can reasonably be inferred that the predominant portion of the collected data does not contain U.S. person information. Although it would be useful to have an accurate estimate of how much incidental U.S. person information actually resides within the remaining portion of the data collected under the Section 702 program, it has proved very difficult to find any solution that would provide such an estimate. The first problem is that the collected data is often not readily identifiable as being associated with a U.S. person and would require the application of additional scarce technological and analytic resources in an effort to make those associations. The second problem is that the targets of the Section 702 collection efforts do not always communicate with persons of foreign intelligence interest. Ironically, an effort to ascertain an accurate estimate of non-pertinent U.S. person information lying dormant in the collected data is inconsistent with the purpose of Section 702, which is to identify foreign intelligence information. Such an effort to provide an estimate would result in more invasive review of U.S. person information.

FISA itself takes a more practical approach in attempting to understand the potential U.S. person privacy implications raised by Section 702 collection. It requires the head of each element of the Intelligence Community to conduct an annual review and to provide an accounting of the references to U.S. persons in intelligence reporting.[14] This outcome-based approach focuses on the U.S. person information that is actually being seen by the Intelligence Community, in order to assess whether there is any prejudicial impact on privacy rights. Also, the Office of the Director of National Intelligence (ODNI) recently released its “Statistical Transparency Report Regarding Use of National Security Authorities–Annual Statistics for Calendar Year 2015.”[15] The report estimates that 94,368 non-U.S. persons are targets of Section 702 collection. By comparison, the report estimates that the IC used 4,672 known U.S. person search terms in 23,800 queries of the lawfully collected Section 702 data. The report also notes that in 2015, the NSA disseminated 4,290 Section 702 intelligence reports that included U.S. person information. Of those reports, the U.S. person information was masked in 3,168 reports and unmasked in 1,122 reports. The remaining major criticisms of the 702 program are more systematic and definitional. One critique is that the government uses too broad a means in its first stage of collection, which is then followed by a more refined collection of data.[16] Judge Thomas F. Hogan of the FISC has described the program more accurately: “While in absolute terms, the scope of acquisition under Section 702 is substantial, the acquisitions are not conducted in a bulk or indiscriminate manner. Rather they are effected through…discrete targeting decisions for individual selectors.”[17]

Another complaint about the Section 702 program is that U.S. person data is retained—at least partially—at all. Under current rules, when the U.S. government targets someone abroad, it is not required to discard the incidentally collected communications of U.S. persons—if authorities conclude that those conversations constitute foreign intelligence.

In that event, even incidental conversations by or about U.S. persons may be retained. And the threshold for querying a U.S. person within the data collected is relatively low. To affirmatively query the data collected about a U.S. person, all that is needed is a determination that the search is reasonably likely to return foreign intelligence information. “Reasonably likely” is an especially easy standard to meet. It does not, for example, require any particularized suspicion that the U.S. person who is subject of the inquiry is engaged in any wrongdoing himself.

For that reason, a Presidential Review Board, as well a few Members of Congress, believe that Section 702 collection on Americans goes too far.[18] The program, they argue, is permissible and lawful without individual case supervision or a warrant requirement precisely because it targets non-Americans. So they contend that when the communications of U.S. persons are queried, probable cause and warrant requirements should apply. Any loophole that allows that particular querying should be closed because the government should not be able to obtain “back door” evidence against U.S. persons that it could otherwise only obtain with judicial approval.

But there is no “back door” here—a query does not collect any additional data. The FISC specifically holds that the 702 collection is constitutional and entirely consistent with the Fourth Amendment’s protections. The court found that “the querying provisions of the FBI Minimization Procedures strike a reasonable balance between the privacy interests of U.S. persons and persons in the United States, on the one hand, and the government’s national security interests, on the other.”[19] Even the fact that the “FBI’s use of those provisions to conduct queries designed to return evidence of crimes unrelated to foreign intelligence” did “not preclude the Court from concluding that taken together, the targeting and minimization procedures submitted with the 2015 Certifications are consistent with the requirements of the Fourth Amendment.”[20]

Obviously, Congress itself did not agree with these systematic and definitional complaints. While the focus of Section 702 collection is on non-U.S. persons located overseas, one of the specifically intended benefits of Section 702 was its ability to provide tip and lead information about persons in the United States who might be conspiring with overseas terrorists. This limited information might prove useful in helping to establish the probable cause necessary to obtain full surveillance coverage of these domestic suspects. It is also important to understand that the response to complaints about the theoretical possibility of abuse under FISA revolves around tight controls. The PCLOB found little evidence of abuse of the Section 215 metadata program, and in the case of Section 702 implementation found virtually no intentional misuse of the collection authorities where U.S. persons were concerned:

Over the years, a series of compliance issues were brought to the attention of the FISA court by the government. However, none of these compliance issues involved significant intentional misuse of the system. Nor has the Board seen any evidence of bad faith or misconduct on the part of any government officials or agents involved with the program. Rather, the compliance issues were recognized by the [FISA] court—and are recognized by the Board—as a product of the program’s technological complexity and vast scope, illustrating the risks inherent in such a program.[21]

Similarly, the PCLOB included a section in its 702 report called “Compliance Issues.” According to the PCLOB, the few instances of error in the administration of the 702 program were infrequent and mainly minor and administrative in nature. That is why the PCLOB found that “internal and external compliance programs have not to date identified any intentional attempts to circumvent or violate the procedures or the statutory requirements, but both unintentional incidents of noncompliance and instances where Intelligence Community personnel did not fully understand the requirements of the statute.”[22]

In other words, all of the errors in the program were accidental or due to mistakes. None was the product of intentional misconduct. Indeed, the non-compliance incident rate has been substantially below 1 percent, according to the PCLOB.[23] Over half of the reported incidents involved instances in which the “NSA otherwise complied with the targeting and minimization procedures in tasking and de-tasking a selector, but failed to make a report to the NSD and ODNI” in a timely fashion.[24]

Two other common reasons why compliance errors occurred are that: (1) the wrong selector was tasked due to a typographical error, or (2) a delay in de-tasking (removing the selector) resulted when an analyst de-tasked some, but not all, of the Section 702-tasked selectors placed on a non-U.S. person target known to be traveling to the United States.[25]

Taken together, these minor administrative errors accounted for “almost 75% of the compliance incidents,” according to the PCLOB.[26]

Section 702: Constitutional and Lawful

One last aspect of Section 702 needs to be addressed: the suggestion that the program might in some way be unconstitutional or unlawful. This Backgrounder concludes that relevant case law firmly supports the constitutionality and legality of the Section 702 program. To support this conclusion, we provide a brief history of relevant case law.

The predicate case is United States v. United States District Court,[27] sometimes known as the Keith case, after Judge Damon Keith, the federal district court judge who oversaw the case.

The case hearkens back to an era of protest and civil unrest in the United States. It involved several leaders of the so-called White Panther Party—a white supremacist group—who were charged with bombing a CIA office in Ann Arbor, Michigan, in 1968. Their phones were wiretapped by order of U.S. Attorney General John Mitchell, who served under President Richard Nixon. Mitchell said that no warrant was required to authorize the interception, because the defendants posed a “clear and present danger to the structure or existence of the government.”

Judge Keith responded that the Attorney General’s rationale was insufficient, and ruled that warrantless interception and surveillance of domestic conversations was unconstitutional. When the case reached the Supreme Court, the justices agreed with Judge Keith, establishing as precedent the idea that a warrant was needed before electronic surveillance commenced, even if the domestic surveillance was related to national security.

As Justice Lewis Powell said in writing for the Court, the “price of lawful public dissent must not be a dread of subjection to an unchecked surveillance power.” Justice Powell continued, “Nor must the fear of un-authorized official eavesdropping deter vigorous citizen dissent and discussion of government action in private conversation. For private dissent, no less than open public discourse, is essential to our free society.”

Notably, however, the Court limited its holding to domestic surveillance, and said that different rules might apply when the surveillance occurred outside the United States, or was directed at a foreign power—or at non-Americans. Regarding surveillance of non-Americans overseas, courts around the country have agreed with the implicit suggestion of the Supreme Court, holding that surveillance for foreign intelligence purposes need only be reasonable (and that a warrant is not required).[28] That distinction—between domestic and foreign surveillance—is preserved in FISA, which allows more relaxed FISA procedures (for which a criminal warrant was not required) only when the purpose of the investigation is to collect foreign intelligence.

In Vernonia School District 47J v. Acton, the Supreme Court upheld the drug testing of high school athletes and explained that the exception to the warrant requirement applied “when special needs, beyond the normal need for law enforcement, make the warrant and probable cause requirements impracticable.”[29] Although Vernonia was not a foreign intelligence case—far from it—the principles from the Court’s “special needs” cases influenced later cases in the national security context.

In “In re: Sealed Case,” the United States Foreign Intelligence Surveillance Court of Review held that FISA did not require the government to demonstrate to the FISA court that its primary purpose in conducting electronic surveillance was not criminal prosecution and, significantly, the PATRIOT Act’s amendment to FISA, permitting the government to conduct surveillance of agents of foreign powers if foreign intelligence was the “significant purpose” of the surveillance, did not violate the Fourth Amendment.[30] The court avoided an express holding that a foreign intelligence exception exists, but held that FISA could survive on reasonableness grounds.

In 2008, “In re: Directives Pursuant to Section 105B of FISA” applied the principles derived from the special needs cases to conclude that the foreign intelligence surveillance authorized by the Protect America Act possesses characteristics that qualify it for a foreign intelligence exception to the warrant requirement of the Fourth Amendment.[31]

Notably, the “In re: Directives” decision cites a Fourth Circuit opinion for the proposition that there is a high degree of probability that requiring a warrant would hinder the government’s ability to collect time-sensitive information and thus impede vital national security interests.[32]

In April 2016, the first decision addressing the constitutionality of upstream collection under Section 702 was publicly released. The FISA court issued a declassified opinion[33] in which it concluded that use of information collected under Section 702 authority for domestic investigations satisfied both constitutional standards and was within the statutory bounds of the FISA Amendments Act. Notably, for purposes of this discussion, the court reached this conclusion after having had the benefit of a public advocate who articulated a position contrary to that of the government.[34] Judge Hogan cites “In re: Directives” in support of the proposition that the Fourth Amendment does not require the government to obtain a warrant to conduct surveillance in order “to obtain foreign intelligence for national security purposes [that] is directed against foreign powers or agents of foreign powers reasonably believed to be located outside of the United States.”

Section 702: Continuing Improvements

On February 5, 2016, the PCLOB issued its “Recommendations Assessment Report.” The purpose of the report was to assess whether the DNI had responded appropriately to recommendations it had made for the improvement of the program.

The DNI had taken action to the PCLOB recommendations. Indeed, with respect to the 10 recommendations relating to the Section 702 program, the PCLOB Recommendations Assessment Report determined that five recommendations have been fully implemented; one has been substantially implemented; three are in the process of being implemented; and one has been partially implemented.[35]

The historical record demonstrates the effectiveness of both the PCLOB’s oversight function and the responsiveness of the DNI to its recommendations—a win-win story in the new age of intelligence oversight.[36]

Conclusions

First, Section 702 is constitutional, statutorily authorized, and carefully constructed to address a vital U.S. national security requirement: the collection of vital information relating to foreign threats.

Second, it seems clear that, in light of careful scrutiny by the PCLOB, the specter of alleged abuse of the program is more theoretical than real.

Third, the Section 702 program has great current utility and provides invaluable intelligence of practical impact and not replaceable by other means of collection.

The benefits of the Section 702 program greatly outweigh its (theoretical) costs and the program should continue as currently authorized. Indeed, the record suggests that the 702 Program is invaluable as a foreign intelligence collection tool. The fruits of the program constitute more than 25 percent of the NSA’s reports concerning international terrorism. It has clearly defined implementation rules and robust oversight by all three branches of government, and is a necessary tool for defending the nation.

Congress should reauthorize 702 in its entirety. There is no need for a further sunset of the act’s provisions, as it has demonstrated its usefulness; and an arbitrarily forced reconsideration by Congress is unnecessary, a waste of time and money, and at the expense of national security.

The program can, and should, be implemented in a manner that is consistent with American values. To quote General Michael Hayden, former director of the NSA and former CIA director:

[A]n American strategy for cyberspace must reflect and serve our ideals. In our zeal to secure the internet, we must be careful not to destroy that which we are trying to preserve, an open, accessible, ubiquitous, egalitarian, and free World Wide Web. There are nations—like Iran, China, Russia and others—who view precisely those attributes as the very definition of cyber security threats. Their concern is not digital theft, but the free movement of ideas. We must take care that in our efforts to prevent the former, we do not legitimize their efforts to prevent the latter.[37]

A properly configured Section 702 program has met that challenge to the benefit of the American public. At a time when international terrorism is on the rise, the United States must have a lawful, robust foreign intelligence capability.

—David R. Shedd is a Visiting Distinguished Fellow in the Kathryn and Shelby Cullom Davis Institute for National Security and Foreign Policy, Paul Rosenzweig is a Visiting Fellow in the Douglas and Sarah Allison Center for Foreign Policy, of the Davis Institute, and Charles D. Stimson is Manager of the National Security Law Program and Senior Legal Fellow in the Center for National Defense, of the Davis Institute, at The Heritage Foundation.

JUNE 06, 2017 5:27 PM

Republicans worried about leaks consider cutting back surveillance authority

 

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 906

Listen To Pronk Pops Podcast or Download Shows 897-905

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 904, June 5, 2017, Story 1: Breaking — Another Radical Islamic Terrorist Jihadist Attack In United Kingdom — 7 Killed By A Van or Large Knifes and 3 Terrorist Attackers Killed By Police On London Bridge and 48 Injured — Videos — Story 2: Big Lie Media and Lying Lunatic Left Losers Become Hysterical Over President Trump Withdrawal From Paris Climate Accord — Videos

Posted on June 5, 2017. Filed under: American History, Barack H. Obama, Blogroll, Breaking News, Business, Climate Change, Coal, Coal, Communications, Congress, Constitutional Law, Corruption, Countries, Donald J. Trump, Donald Trump, Economics, Elections, Employment, Energy, European History, Free Trade, Freedom of Speech, Genocide, Government, Government Dependency, Government Spending, History, House of Representatives, Human, Illegal Immigration, Immigration, Independence, Investments, Labor Economics, Law, Legal Immigration, Life, Media, Middle East, Natural Gas, Natural Gas, News, Nuclear, Obama, Oil, Oil, People, Philosophy, Photos, Politics, Polls, President Barack Obama, Raymond Thomas Pronk, Regulation, Resources, Rule of Law, Scandals, Security, Senate, Solar, Success, Surveillance and Spying On American People, Taxation, Taxes, Terror, Terrorism, Unemployment, United Kingdom, United States of America, Videos, Violence, War, Wealth, Weapons, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

 

Pronk Pops Show 904,  June 5, 2017

Pronk Pops Show 903,  June 1, 2017

Pronk Pops Show 902,  May 31, 2017

Pronk Pops Show 901,  May 30, 2017

Pronk Pops Show 900,  May 25, 2017

Pronk Pops Show 899,  May 24, 2017

Pronk Pops Show 898,  May 23, 2017

Pronk Pops Show 897,  May 22, 2017

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

 Ringleader Abz from east London lays dying on the floor following hail of police bullets

Image result for dr. john christy slides climate change

Image result for dr. john christy slides climate change

Image result for the natural causes of climate change

Story 1: Breaking — Another Radical Islamic Terrorist Jihadist Attack In United Kingdom — Videos —

Image result for june 3, 2017 london bridge attack map 8 minutesImage result for june 3, 2017 london bridge attack map 8 minutesImage result for june 3, 2017 london bridge attack map 8 minutesImage result for june 3, 2017 london bridge attack map 8 minutesImage result for june 3, 2017 london bridge attack map 8 minutesImage result for june 3, 2017 london bridge attack map 8 minutesImage result for june 3, 2017 london bridge attack map 8 minutes

American describes seeing van hit people on London Bridge

London attack: Eight minutes of terror

London Bridge attack: What happened

Canadian killed in London terror attack identified

London Bridge Terror Attack: Eyewitness Account #2 – John Stokes

London Bridge Attack: 19-year-old says taxi driver saved her life

Tucker: Our leaders help fanatics who hate our way of life

Krauthammer: London attacks a failure of assimilation

Mark Steyn: Britain must stop importing terrorism

Katie Hopkins! “London Bridge Has Fallen Down!”

Trump Hazes London’s Mayor On Twitter

Eyewitness describes horror as van mowed down pedestrians

Kallstrom on terror in London: We need to change the laws

‘Get down! Stay down!’ Police sweep restaurant in London

Report: London attackers yelled ‘This is for Allah’

Muslim man: This attack does not represent Islam at all

London Bridge Attack – June 3, 2017

Theresa May on London Bridge terror attack FULL STATEMENT from Downing St. (04Jun17)

British Prime Minister Theresa May on U.K. terror attack: ‘Enough is enough’ –

NIGEL FARAGE REACTS TO THE LONDON BRIDGE INCIDENT

London Bridge Attack: The Final Straw and Game Changer — What Needs to Be Done Immediately

London Bridge Attacks, Politicians Attempt to Respond and the Media Remain Dumbfounded

 

THE JIHADI NEXT DOOR

London Bridge attacker in Arsenal shirt was ex-Tube worker ‘family man’ called Abz, 27 who appeared on Channel 4 documentary

The maniac was gunned down along with two other terror thugs by armed cops on Saturday in Borough Market

THE Arsenal kit wearing ringleader of the London Bridge terror attack posed with a jihadi flag on Channel 4 documentary The Jihadis Next Door, was thrown out of a mosque and tried to radicalise kids in his local park in the years ahead of the devastating atrocity.

The ex-KFC and London Tube worker, known as Abz, 27, was quizzed by cops over his twisted views before he was gunned down along with his two accomplices down following the depraved assault on Saturday night.

Ringleader Abz from east London lays dying on the floor following hail of police bullets

Ringleader Abz from east London lays dying on the floor following hail of police bullets

Abz pictured here turning to the camera after posing with the jihadi flag in the park

Abz pictured here turning to the camera after posing with the jihadi flag in the park

The terrorist was pictured as part of a group in Regent’s Park brandishing a black flag

The terrorist was pictured as part of a group in Regent’s Park brandishing a black flag

 

The video showed the group gathered in a London park

Suspected London Bridge terror suspect appears with a group brandishing a Jihadi flag in TV documentary ‘The Jihadis Next Door’

Borough Market moments after the terrorists were shot by armed police

Borough Market moments after the terrorists were shot by armed police

The ringleader of the terror gang pictured here after being shot in Borough Market

The ringleader of the terror gang pictured here after being shot in Borough Market

The trio killed seven people after mowing down revellers in central London before going on a rampage wearing fake bomb vests and wielding hunting knives.

The man who went on to wage a horrific attack on people at London Bridge previously appeared in a programme called The Jihadis Next Door on Channel 4 and was also thrown out of his mosque for ranting about an election.

A former friend of the Watford-born married father-of-two has revealed he contacted police about the terror thug’s extremist views, and claims he was radicalised after watching twisted YouTube videos.


RED FLAGS ON HIS RISE TO TERROR ATROCITY:

  • Abz appeared on C4’s The Jihadis Next Door unfurling a jihadi flag
  • He was thrown out of his mosque for ranting that voting in an election was “un-Islamic”
  • A friend contacted police about him due to concerns – he was quizzed but not arrested and allowed to keep his passport
  • He attempted to radicalise children in a nearby park
  • He was reported for a demonstration in Regents Park

The unnamed man said he contacted cops in Barking, east London, after the maniac killer discussed ISIS-inspired terror attacks.

He told BBC’s Asian Network that the jihadi had become brainwashed after watching clips of US hate preacher Ahmad Musa Jibril.

He said: “He used to listen to a lot of Musa Jibril. I have heard some of this stuff and it’s very radical.

“I am surprised this stuff is still on YouTube and is easily accessible.

“I phoned the anti-terror hotline. I spoke to the gentleman. I told him about our conversation and why I think he was radicalised.”

After confirming Abz was allowed to keep his passport and was not arrested, he added: “I did my bit, I know a lot of other people did their bit, but the authorities did not do their bit.”


WHAT WE KNOW SO FAR:

Did you see the London Bridge terror attack, or know anyone involved? Please contact The Sun newsdesk on 020 7782 4100, text 07423720250 or email exclusive@the-sun.co.uk


Abz appeared on a Channel 4 documentary The Jihadis Next Door last year

Abz appeared on a Channel 4 documentary The Jihadis Next Door last year

The radical group he was part of featured heavily on the show

The radical group he was part of featured heavily on the show

The London Bridge attacker known as Abz was said to be radicalised after watching videos of hate preacher Ahmad Musa Jibril

The London Bridge attacker known as Abz was said to be radicalised after watching videos of hate preacher Ahmad Musa Jibril

Another neighbour Erica Gasparri also said she shopped the terrorist to police in Barking when he tried to “brainwash” her children.

The Italian mum-of-three sensationally revealed that two of her kids came home from the local park and said: “Mummy I want to become a Muslim,” reports the Telegraph.

She said: “He was trying to radicalise the children, he would go down to the park and talk to them about Islam.

“He also came to the houses and gave the kids money and sweets during Ramadan.”

A photographer captured a detective carrying notes yesterday which appeared to suggest a man in the investigation had been quizzed by police last year – while the name of the person has not been revealed, it is thought to be one of the three men who carried out Saturday’s terror attack.

Two killers stalk innocent victims in Borough Market on Saturday night

Two killers stalk innocent victims in Borough Market on Saturday night

The third jihadi monster can be seen in the middle of his killing spree

The third jihadi monster can be seen in the middle of his killing spree

A police officer comforts an emotional woman at the scene of the attack on Sunday

A police officer comforts an emotional woman at the scene of the attack on Sunday

The white van used in the deadly attack is removed by authorities on Sunday

21
The white van used in the deadly attack is removed by authorities on Sunday

Police storm into bar amid London Bridge terror attack

A YouTube video shows the extremist in Islamic dress and shades berating police outside a London mosque.

He was part of a group reported for demonstrating in Regent’s Park, central London.

A source said: “After that the word went around that he was someone to be avoided at all costs.

“With every passing day he began to look more and more like a terrorist.”

Other residents in Barking who knew the warped thug described him as a family man who held the door open for old ladies and played with local children.

But one neighbour said he constantly changed his facial appearance and “always looked different,” reports the Mail Online.

Another unnamed resident who knew him described him as a “generous” person who people would leave their children with.

Speaking with the Mail, he said: “He used to play table tennis and he was really generous with everyone’s kids. People would leave their kids to play with him.

“You’d never expect anything like this from him.”

A picture of the van used in the deadly terror attack which left seven innocent people dead in the London Bridge area

21
A picture of the van used in the deadly terror attack which left seven innocent people dead in the London Bridge area

A victim being treated on a stretcher following the terror attack on London Bridge

A victim being treated on a stretcher following the terror attack on London Bridge

Dashcam footage shows bodies lying on pavement after London Bridge terror attack

The extremist was thrown out of an East London mosque two years ago for ranting that voting in an election was “un-Islamic”.

One local said: “On Saturday he was asking one of our other neighbours where he could rent a van and how much it would cost.”

The wife of the killer, who was of Pakistani origin, had just given birth to their second child, neighbours in Barking revealed.

The couple are believed to have been living with his mum — enjoying a comfortable lifestyle boosted by state handouts.

The beast was thrown out of his local mosque in 2015 after he interrupted a sermon to shout that voting in a general election was “un-Islamic.”

A source said: “He had no special friends there. He would arrive, pray and then leave.

“He seemed an uneducated person who had no knowledge of religion.”

A neighbour said: “He was into football. He would play on the park.”

Ikenna Chigbo recognised the killer’s old Arsenal shirt in an image of the shot terrorists.

He said: “He was wearing the same top yesterday. He was saying to me, ‘Oh, where can I get a van from?

Masked military personnel patrol London Streets

Masked military personnel patrol London Streets

Police give urgent instructions to the public following the terror attack

Police give urgent instructions to the public following the terror attack

“He was just asking me all the details — how much was it, and just like asking where he could get a van, basically.”

Another neighbour, Furqan Nabi, 35, said: “Abz came from a Pakistani family but was brought up in this country from a very young age.

“He seemed like a totally normal, nice guy. I can’t believe what has happened.”

The accountant also told how the extremist asked about hiring a van.

He said: “He was a bit vague about why he wanted it.

“The reason was far more shocking than anyone could have realised.”

The family’s social housing flat was raided by counter-terror cops at 7am — one of a series of swoops in the wake of the atrocity that stunned Britain and the world.

A total of 12 people were arrested in the area and near, all of whom have since been released without charge.

The killer’s sister was held in East Ham.

A large area of an East Ham street was cordoned off this afternoon

A large area of an East Ham street was cordoned off this afternoon

Flats above a number of shops were raided as police swarmed on the area in East Ham

Flats above a number of shops were raided as police swarmed on the area in East Ham

Woman taken away on stretcher from the flats in Barking

Her husband said: “I don’t know anything. We haven’t been told what’s going on. We just want to grieve in peace.”

Half a mile from the brother’s flat, police blew in the door of an apartment and seized a mother of one aged 38 as she cradled her 18-month-old daughter.

The tearful mum was bundled into the back of an unmarked Ford Mondeo.

Her toddler was taken away in another car. A neighbour said: “Her ex-boyfriend Rashid used to live with them but moved out a few weeks ago.”

In another part of Barking — which is eight miles from the scene of Saturday night’s horror — armed cops had to talk a man out of jumping from the window of a flat they raided.

Terrified Londoners put their hands above their heads

Terrified Londoners put their hands above their heads

Police instructed the public to put hands above their heads to avoid terrorist hiding in the crowd

Police instructed the public to put hands above their heads to avoid terrorist hiding in the crowd

A witness said: “Five people were arrested and taken out of the house, including a woman.”

A friend of Abz, who quit his KFC job around two years ago to work on the Tube, said: “Back then he had a reputation for being a bit shady and taking drugs.

“But all that changed when he became radicalised. He began stopping his neighbours in the street and asking them if they had been saying their prayers and when they had been to the mosque.”

Deene Azak, 34, whose home is near where the killer lived, said: “I saw him two days ago and he had shaved his head. That’s how I recognised him when I saw a picture of an attacker dead at the scene at London Bridge.”

https://www.thesun.co.uk/news/3723382/attacker-arsenal-kit-kfc-c4-doc-jihadi-flag-radicalise-kids-thrown-out-mosque-quizzed-cops/

12 arrested in London’s night of terror; IS claims attack

LONDON (AP) – British police arrested a dozen people Sunday in a widening terrorism investigation after attackers using a van and large knives turned a balmy evening of nightlife into a bloodbath and killed seven people in the heart of London. The Islamic State group claimed responsibility.

Although the attackers were also dead, authorities raced to determine whether they had accomplices, and Prime Minister Theresa May warned that the country faced a new threat from copycat attacks.

The country’s major political parties temporarily suspended campaigning with only days to go before the general election. May said the vote would take place as scheduled Thursday because “violence can never be allowed to disrupt the democratic process.”

Police forensic officers on London Bridge Sunday June 4, 2017 following Saturday night's terrorist incident. The assault began Saturday night when a van veered off the road and barreled into pedestrians on busy London Bridge. Three men fled the van with large knives and attacked people at bars and restaurants in nearby Borough Market, police and witnesses said. The attack unfolded quickly, and police said officers had shot and killed the three attackers within eight minutes. (Andrew Matthews/PA via AP)

The assault unfolded over a few terrifying minutes late Saturday, starting when a rented van veered off the road and barreled into pedestrians on busy London Bridge. Three men then got out of the vehicle with large knives and attacked people at bars and restaurants in nearby Borough Market until they were shot dead by police.

“They went ‘This is for Allah,’ and they had a woman on the floor. They were stabbing her,” witness Gerard Vowls said.

Florin Morariu, a Romanian chef who works in the Bread Ahead bakery, said he saw people running and some fainting. Then two people approached another person and “began to stick the knife in … and then I froze and I didn’t know what to do.”

He said he managed to get near one attacker and “hit him around the head” with a bread basket.

“There was a car with a loudspeaker saying ‘go, go’ and they (police) threw a grenade. … and then I ran,” he said.

London police said officers killed the attackers within eight minutes of arriving at the scene. Eight officers fired some 50 rounds, said Assistant Commissioner Mark Rowley, the force’s head of counterterrorism.

Islamic State’s statement from its Aamaq news agency claimed the group’s “fighters” were responsible, the SITE Intelligence Group said Sunday. IS has urged supporters to weaponize vehicles in attacks against the West.

It was the third attack in Britain this year that Islamic State has claimed – including the similar attack on Westminister Bridge in March and the Manchester concert bombing two weeks ago – and one of several involving vehicles in Europe, including last year’s Bastille Day rampage in the French city of Nice.

The three attackers Saturday were wearing what appeared to be suicide belts, but the belts turned out to be fake. Investigators were working to determine whether others assisted them, Rowley said.

A bystander was also wounded by the gunfire, but the civilian’s injuries were not believed to be critical.

Forty-eight people, including two police officers, were treated at hospitals. Twenty-one remained in critical condition Sunday. Among the wounded were German, French, Spanish and Australian citizens, officials said.

Canadian Prime Minister Justin Trudeau said a Canadian woman was among the dead, and a French national was also confirmed dead.

Counterterrorism officers raided several addresses in Barking, an east London suburb, and arrested 12 people there Sunday, police said.

Neighbors at the site of one raid in Barking said a man who lived there resembled one of the attackers shown in news photographs.

“He’s lived here for about three years,” Damien Pettit said. “He’s one of our neighbors. I’ve said hello in passing more than 50, 60 occasions. He has two young kids. He was a very nice guy.”

Armed officers also conducted a raid in the East Ham area of the city. Video showed police shouting at someone: “Get on the balcony. Stand up and show us your hands!”

The rampage was the third major attack in Britain in the past three months, including a similar vehicle and knife attack on Westminster Bridge in March that left five people dead.

On May 22, a suicide bomber killed 22 people and injured dozens at an Ariana Grande concert in Manchester, in northwest England. Grande and other stars performed Sunday night at a benefit concert for victims under tight security in Manchester.

“I don’t feel or smell or hear or see any fear in this building. All we feel here tonight is love, resilience, positivity,” said Pharrel Williams, who performed alongside Miley Cyrus.

May said the London and Manchester attacks were not directly connected, “but we believe we are experiencing a new trend in the threat we face” as “terrorism breeds terrorism” and attackers copy one another. She said five credible plots have been disrupted since March.

“It is time to say, enough is enough,” she said.

Britain’s official terrorism threat level was raised from “severe” to “critical” after the Manchester attack, meaning an attack may be imminent. Several days later it was lowered again to “severe,” meaning an attack is highly likely.

Home Secretary Amber Rudd said Sunday that the level would remain at severe because police believe there are no perpetrators still on the loose.

London Bridge and a large area on the south bank of the River Thames remained cordoned off Sunday, and police told people to avoid the area.

Hours earlier, the area packed with bars and restaurants around the foodie magnet of Borough Market had been a scene of panic, as people barricaded themselves in pubs and restaurants or fled through the streets.

Medics treated the wounded near the market as shocked people cried and shouted around them. Police officers yelled at people to run from the area, and blasts were heard as officers performed a series of controlled explosions.

Renan Marquese, a sous-chef at a tapas restaurant, said he was working when he heard chaotic sounds outside.

“When I open the door I see three dead people on the floor,” he said. “People running everywhere, police shouting to run away.”

He said that he helped a man and his partner, even taking the woman into his arms because she was too upset to walk properly. He said it took him 20 minutes to carry her across the bridge, stumbling all the way.

“It was really scary,” he said.

Amid the violence and fear were stories of compassion and heroism. The British Transport Police said one of their officers, among the first to arrive, took the attackers on armed only with his baton and was seriously wounded. He was later described as being in stable condition with injuries that were not life-threatening.

Witnesses described how passers-by threw chairs and beer glasses at the attackers in an attempt to stop them.

Richard Angell, who was in a restaurant, said he looked out and saw “a guy who is throwing a table at somebody, and it’s very unclear about what is happening. And it turns out to be a heroic guy who saw what was happening and just bombarded these terrible cowardly people with stuff.”

Vowls also saw people striking back at the attackers and said he joined in.

“I went ‘Oi, terrorists, cowards, Oi!'” he told The Associated Press. Then he picked up a chair.

“I chucked it, but I think I missed one of them, and then I picked up a stool, and I threw it at him. And he looked at me. He started running towards me, and then he decided not to.

“Then I was screaming at them, picking up bottles from a beer barrel. I was just throwing it at them, trying to get them to chase me so I could get them out into the main road where the police could see them and obviously take them down.”

___

Associated Press writers Lori Hinnant, Sylvia Hui, Raphael Satter, David Keyton and Niko Price in London and Alison Mutler in Bucharest contributed to this report.

A small child lays flowers at a corner tribute in the London Bridge area of London, Sunday, June 4, 2017. Police specialists collected evidence in the heart of London after a series of attacks described as terrorism killed several people and injured more than 40 others. (AP Photo/Frank Augstein)

A small child lays flowers at a corner tribute in the London Bridge area of London, Sunday, June 4, 2017. Police specialists collected evidence in the heart of London after a series of attacks described as terrorism killed several people and injured more than 40 others. (AP Photo/Frank Augstein)

Police guard a corner near a tribute of flowers and posters in the London Bridge area of London, Sunday, June 4, 2017. Police specialists collected evidence in the heart of London after a series of attacks described as terrorism killed several people and injured more than 40 others. (AP Photo/Frank Augstein)

Police guard a corner near a tribute of flowers and posters in the London Bridge area of London, Sunday, June 4, 2017. Police specialists collected evidence in the heart of London after a series of attacks described as terrorism killed several people and injured more than 40 others. (AP Photo/Frank Augstein)

Police surround the van used by the attackers at London Bridge, Saturday June 3, 2017. The assault began Saturday night when a van veered off the road and barreled into pedestrians on busy London Bridge. Three men fled the van with large knives and attacked people at bars and restaurants in nearby Borough Market, police and witnesses said. (AP Photo/Kevin Dunne)

Police surround the van used by the attackers at London Bridge, Saturday June 3, 2017. The assault began Saturday night when a van veered off the road and barreled into pedestrians on busy London Bridge. Three men fled the van with large knives and attacked people at bars and restaurants in nearby Borough Market, police and witnesses said. (AP Photo/Kevin Dunne)

In this image taken from video footage, people run from the scene of attack, alongside a man strolling holding a pint of beer, right, in London, late Saturday, June 3, 2017. People in the U.K. have responded to the deadly London Bridge attack with sorrow and distinctly British humor, hailing a man pictured walking away from the mayhem holding a pint of beer as a tongue-in-cheek symbol of defiance. (Sky news via AP)

In this image taken from video footage, people run from the scene of attack, alongside a man strolling holding a pint of beer, right, in London, late Saturday, June 3, 2017. People in the U.K. have responded to the deadly London Bridge attack with sorrow and distinctly British humor, hailing a man pictured walking away from the mayhem holding a pint of beer as a tongue-in-cheek symbol of defiance. (Sky news via AP)

A tribute of flowers has been placed on the pavement and a poster with a photo of London Bridge is taped on a wall in the London Bridge area of London, Sunday, June 4, 2017. Police specialists collected evidence in the heart of London after a series of attacks described as terrorism killed several people and injured more than 40 others. (AP Photo/Frank Augstein)

A tribute of flowers has been placed on the pavement and a poster with a photo of London Bridge is taped on a wall in the London Bridge area of London, Sunday, June 4, 2017. Police specialists collected evidence in the heart of London after a series of attacks described as terrorism killed several people and injured more than 40 others. (AP Photo/Frank Augstein)

Two women hug after bringing flowers to add to tributes laid on the north side of London Bridge following last night's terrorist incident, Sunday, June 4, 2017. Police specialists collected evidence in the heart of London after a series of attacks described as terrorism killed several people and injured more than 40 others. (David Mirzoeff/PA via AP)

Two women hug after bringing flowers to add to tributes laid on the north side of London Bridge following last night’s terrorist incident, Sunday, June 4, 2017. Police specialists collected evidence in the heart of London after a series of attacks described as terrorism killed several people and injured more than 40 others. (David Mirzoeff/PA via AP)

Two women hug after bringing flowers to add to tributes laid on the north side of London Bridge following last night's terrorist incident, Sunday, June 4, 2017. Police specialists collected evidence in the heart of London after a series of attacks described as terrorism killed several people and injured more than 40 others. (David Mirzoeff/PA via AP)

Two women hug after bringing flowers to add to tributes laid on the north side of London Bridge following last night’s terrorist incident, Sunday, June 4, 2017. Police specialists collected evidence in the heart of London after a series of attacks described as terrorism killed several people and injured more than 40 others. (David Mirzoeff/PA via AP)

A woman hands flowers to a police officer to lay on the north side of London Bridge following last night's terrorist incident, Sunday, June 4, 2017. Police specialists collected evidence in the heart of London after a series of attacks described as terrorism killed several people and injured more than 40 others. (David Mirzoeff/PA via AP)

A woman hands flowers to a police officer to lay on the north side of London Bridge following last night’s terrorist incident, Sunday, June 4, 2017. Police specialists collected evidence in the heart of London after a series of attacks described as terrorism killed several people and injured more than 40 others. (David Mirzoeff/PA via AP)

A man lays flowers at a corner tribute in the London Bridge area of London, Sunday, June 4, 2017. Police specialists collected evidence in the heart of London after a series of attacks described as terrorism killed several people and injured more than 40 others. (AP Photo/Frank Augstein)

A man lays flowers at a corner tribute in the London Bridge area of London, Sunday, June 4, 2017. Police specialists collected evidence in the heart of London after a series of attacks described as terrorism killed several people and injured more than 40 others. (AP Photo/Frank Augstein)

Armed police on St Thomas Street, London, Sunday June 4, 2017, near the scene of Saturday night's terrorist incident on London Bridge and at Borough Market. Several people were killed in the terror attack at the heart of London and dozens injured. Prime Minister Theresa May convened an emergency security cabinet session Sunday to deal with the crisis. (Dominic Lipinski/PA via AP)

Armed police on St Thomas Street, London, Sunday June 4, 2017, near the scene of Saturday night’s terrorist incident on London Bridge and at Borough Market. Several people were killed in the terror attack at the heart of London and dozens injured. Prime Minister Theresa May convened an emergency security cabinet session Sunday to deal with the crisis. (Dominic Lipinski/PA via AP)

Chairman of the London Fatwa Council, Mohammad Yazdani Raza hold a sign as he marches near Borough Market in London, Sunday, June 4, 2017. Police specialists collected evidence in the heart of London after a series of attacks described as terrorism killed several people and injured more than 40 others. (AP Photo/Frank Augstein)

Chairman of the London Fatwa Council, Mohammad Yazdani Raza hold a sign as he marches near Borough Market in London, Sunday, June 4, 2017. Police specialists collected evidence in the heart of London after a series of attacks described as terrorism killed several people and injured more than 40 others. (AP Photo/Frank Augstein)

http://www.dailymail.co.uk/wires/ap/article-4570246/Terror-attacks-strike-heart-London-6-people-killed.html#ixzz4jAVTu5hl
Follow us: @MailOnline on Twitter | DailyMail on Facebook

 

Story 2: Big Lie Media and Lying Lunatic Left Losers Become Hysterical Over President Trump’s Withdrawal From Paris Climate Accord —  Videos

Social scientists should never try to predict the future; they have trouble enough predicting the past.”

~James Q. Wilson

Image result for dr. john christy slides climate change

Image result for the natural causes of climate changeImage result for dr. john christy slides climate change

Image result for dr. john christy slides climate changeImage result for banco cartoons on climate warming and climate coolingImage result for banco cartoons on climate warming and climate cooling

Image result for banco cartoons on climate warming and climate cooling

Image result for banco cartoons on climate warming and climate cooling

Image result for banco cartoons on climate warming and climate cooling

Image result for banco cartoons on climate warming and climate cooling

Image result for banco cartoons on climate warming and climate coolingImage result for banco cartoons on climate warming and climate coolingImage result for banco cartoons on climate warming and climate cooling

Image result for banco cartoons on climate warming and climate cooling

Image result for banco cartoons on climate warming and climate cooling

Image result for banco cartoons on climate warming and climate cooling

Image result for banco cartoons on climate warming and climate cooling

Image result for banco cartoons on climate warming and climate cooling

Image result for banco cartoons on climate warming and climate cooling

Image result for banco cartoons on climate warming and climate cooling

Image result for dr. john christy slides climate change

Image result for dr. john christy slides climate change

Image result for dr. john christy slides climate change

Image result for dr. john christy slides climate change

Image result for dr. john christy slides climate change

Image result for dr. john christy slides climate change

Image result for dr. john christy slides climate changeImage result for dr. john christy slides climate change

Image result for reality vs climate models hot spot

Image result for reality vs climate models hot spot

Image result for reality vs climate models hot spot

Image result for temperature warming or cooling? over 800,000 years

Image result for temperature warming or cooling? over 800,000 years

 

Tucker: Trump gets US out of bad deal and left melts down

Amb. Bolton: Leaving Paris accord is an ‘excellent decision’

The optics of withdrawing from the Paris climate deal

A Funny Thing Happened on the Way to Global Warming

Professor Fred Singer on Climate Change Pt 1

Professor Fred Singer on Climate Change pt 2

Stossel: Blinding Us with “Science”

Climate Change: What Do Scientists Say?

Climate Change: What’s So Alarming?

Is Climate Change Our Biggest Problem?

What They Haven’t Told You about Climate Change

Do 97% of Climate Scientists Really Agree?

Why People Don’t Believe In Climate Science

Dr. John R. Christy on Climate Change at Congressional Hearing

John Christy on The Economics and Politics of Climate Change

John Christy: Climatologist – Science, Politics and Morality

Another scientist comes out against global warming

Exploring Climate Change: Full Length Interview with Dr. John Christy

Global Warming / Climate Change Hoax – Dr. Roy Spencer (1)

MIT Professor Richard Lindzen On the Corruption of Climate Science

Interview with Professor Richard Lindzen

Richard Lindzen “Global Warming Alarmism: Science in the Public Square”

Climate I: Is The Debate Over?

Image result for banco cartoons on climate warming and climate cooling

Dr Easterbrook Global Warming HOAX & Facts

Climate Change in 12 Minutes – The Skeptic’s Case

Dr David Evans: Global Warming is Manmade? (1 of 2)

Dr David Evans: Global Warming is Manmade? (2 of 2)

Wikileaks on “Climategate” …

Climategate: What They Aren’t Telling You!

Climategate: Dr. Tim Ball on the hacked CRU emails

Climategate is Still the Issue

Climategate: The Backstory

The Climategate Scandal. (Part 1)

The Climategate Scandal. (Part 2)

The Climategate Scandal. (Part 3)

Fred Singer (Panel 4) – ICCC9 July 8, 2014

Fred Singer on Climate Change Data

S. Fred Singer | Global Warming: Scientific Fact or Fiction?

Freeman Dyson: A Global Warming Heretic

Freeman Dyson on the Global Warming Hysteria April, 2015

Freeman Dyson: Heretical Thoughts About Science and Society

Freeman Dyson – Where Do the Laws of Nature Come From?

Freeman Dyson on Global Warming 1 of 2 Bogus Climate Models

Freeman Dyson on Global Warming 2 of 2 Bogus Climate Models

More Scientists don’t see CO2 as temperature driver

Professor Bob Carter PhD on Global Warming

The more CO2, the better: Bob Carter

The Global Warming Hoax Explained for Dummies

Global warming and the Carbon Tax Scam

Can You Trust The Press?

The Dark Art of Political Intimidation

7 INSANE Effects of Climate Change in Your Lifetime

MAJOR REDUCTIONS IN CARBON EMISSIONS ARE NOT WORTH THE MONEY 4 /14- Intelligence Squared U.S.

What the media isn’t telling you about Climate Change