Socials Security

The Pronk Pops Show 1207, February 13, 2019, Story 1: There Was No Evidence of Russian Collusion With Trump Campaign Concludes Senate Intelligence Committee — Massive Lying By Democrats and Big Lie Media To Cover-up Clinton Obama Democrat Criminal Conspiracy — Videos — Story 2: President Trump Will Double The Human Border Barrier By Adding 300 Miles of Human Border Barrier Next To Existing 300 Miles of Vehicle Barrier Plus 50 More Miles — Videos — Story 3: Central Banks Buying Gold and Dumping Dollars and Other Fiat Currencies — A Return To The Gold Standard? — Videos

Posted on February 14, 2019. Filed under: Addiction, Addiction, Blogroll, Breaking News, Bribery, Bribes, Business, Clinton Obama Democrat Criminal Conspiracy, College, Communications, Congress, Constitutional Law, Corruption, Countries, Crime, Culture, Deep State, Defense Spending, Donald J. Trump, Eating, Elections, Empires, Federal Bureau of Investigation (FBI), Federal Government, Fifth Amendment, First Amendment, Fourth Amendment, Government, Government Dependency, Government Spending, Health, Health Care Insurance, High Crimes, History, House of Representatives, Human, Human Behavior, Illegal Immigration, Immigration, Impeachment, Independence, Law, Legal Immigration, Life, Lying, Media, Medicare, Military Spending, National Interest, National Security Agency, News, People, Philosophy, Photos, Politics, Polls, Pro Life, Progressives, Public Corruption, Radio, Raymond Thomas Pronk, Rule of Law, Scandals, Second Amendment, Security, Senate, Socials Security, Spying, Spying on American People, Success, Surveillance/Spying, Tax Fraud, Taxation, Taxes, Treason, Trump Surveillance/Spying, Unemployment, United States Constitution, United States of America, United States Supreme Court, Videos, Violence, Wall Street Journal, War, Wealth, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , , , |

 

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 1207 February 13, 2019

Pronk Pops Show 1206 February 12, 2019

Pronk Pops Show 1205 February 11, 2019

Pronk Pops Show 1204 February 8, 2019

Pronk Pops Show 1203 February 7, 2019

Pronk Pops Show 1202 February 6, 2019

Pronk Pops Show 1201 February 4, 2019

Pronk Pops Show 1200 February 1, 2019

Pronk Pops Show 1199 January 31, 2019

Pronk Pops Show 1198 January 25, 2019

Pronk Pops Show 1197 January 23, 2019

Pronk Pops Show 1196 January 22, 2019

Pronk Pops Show 1195 January 17, 2019

Pronk Pops Show 1194 January 10, 2019

Pronk Pops Show 1193 January 9, 2019

Pronk Pops Show 1192 January 8, 2019

Pronk Pops Show 1191 December 19, 2018

Pronk Pops Show 1190 December 18, 2018

Pronk Pops Show 1189 December 14, 2018

Pronk Pops Show 1188 December 13, 2018

Pronk Pops Show 1187 December 12, 2018

Pronk Pops Show 1186 December 11, 2018

Pronk Pops Show 1185 December 10, 2018

Pronk Pops Show 1184 December 7, 2018

Pronk Pops Show 1183 December 6, 2018

Pronk Pops Show 1182 December 5, 2018

Pronk Pops Show 1181 December 4, 2018

Pronk Pops Show 1180 December 3, 2018

Pronk Pops Show 1179 November 27, 2018

Pronk Pops Show 1178 November 26, 2018

Pronk Pops Show 1177 November 20, 2018

Pronk Pops Show 1176 November 19, 2018

Pronk Pops Show 1175 November 16, 2018

Pronk Pops Show 1174 November 15, 2018

Pronk Pops Show 1173 November 14, 2018

Pronk Pops Show 1172 November 9, 2018

Pronk Pops Show 1171 November 8, 2018

Pronk Pops Show 1170 November 7, 2018

Pronk Pops Show 1169 November 5, 2018

Pronk Pops Show 1168 November 2, 2018

Pronk Pops Show 1167 November 1, 2018

See the source imageSee the source imageSee the source imageSee the source imageSee the source image

See the source image

Story 1: Senate Intelligence Committee Finds No Evidence of Russian Collusion With Trump Campaign — Massive Lying By Democrats and Big Lie Media To Cover-up Clinton Obama Democrat Criminal Conspiracy — Videos

Senate Intelligence Chairman says no sign of Russia collusion yet

Senate Intel chair Richard Burr speaks to CBS News on Russia probe

Nunes reveals criminal referral plans once Barr is AG

FBI emails show officials coordinating Hillary, Weiner probes

Senate Has Found No Direct Evidence Of Collusion Between Trump And Russia | Hallie Jackson | MSNBC

Tucker: There was no Russian collusion

Trump and Russia: An Introduction to What We Know (and What We Don’t)

New insight into the Senate’s Russia investigation

Senate Intel Committee is run by the Democrats: Tom Fitton

Steyn: Hillary just can’t accept she lost to Trump

Hume: Hillary just can’t own up to her mistakes

Steyn: Hillary was the ‘entitled candidate’

Dems now don’t think Russia collusion is a big deal?

Did Hillary Clinton collude with the Russians to get ‘dirt’ on Trump to feed it to the FBI?

Story 2: President Trump Will Double The Human Border Barrier By Adding 300 Miles of Human Border Barrier Next To Existing 300 Miles of Vehicle Barrier Plus 50 More Miles —

Rove: Trump has the authority reprogram border security funding

The Wall – A Nation Divided

Walls of Shame: The US-Mexican Border l Featured Documentaries

McCarthy sees border deal as down payment on border wall

The Wall: A 2,000-mile border journey

The Wall: Violence on ranchers’ land

The No Man’s Land Beneath the Border Wall

Watch The New Vehicle wall formed by Texas Police to Help Border Wall.

Construction for new Texas border wall begins

The Wall – A Nation Divided

Close look at a Mexican border wall in Hidalgo, Texas

The wall of eyes trained on the US – Mexico border

Ranching in No Man’s Land

Border security US rancher’s warning on immigration reform

(Part II) A Day in the Life of an Arizona Rancher: Fences, Illegal Aliens, and One Man’s Watchtower

Story 3: Central Banks Buying Gold and Dumping Dollars and Other Fiat Currencies — A Return To The Gold Standard? — Video

David Stockman – Central Banks Created Fiscal Doomsday Machine

Central Banks Are Buying Gold – That is All I Need To Know!

Central Banks Gold Buying Hits Highest Level In Half A Century

Gold Alert: Central Bank Increases Reserves By 1000% – Mike Maloney

Central Banks Are Stocking Up On Gold

Keiser Report: Crypto-collateralized contracts (E1344)

Keiser Report: Are We Back on a Gold Standard? (E1342)

[yotuube=https://www.youtube.com/watch?v=s0BQ2H8zc6c]

Why Are Central Banks Buying GOLD & SILVER At Record Pace?? Paradigm Shift Imminent!

Jim Rickards – The New Axis of Gold – How emerging market central banks are accumulating gold

David Stockman Warns “Gold Is The Only Safe Asset Left”

 

Central banks are buying the most gold since the end of World War II — here’s why

gold bars

Gold is in vogue.

 REUTERS/Beawiharta

  • Central banks have bought the most gold since the end of World War II, with the commodity becoming an increasingly valuable hedge against growing global instability.
  • The near-record buildup in government debt globally, particularly in the US, makes other perceived risk-free assets less attractive.
  • Gold is seen to have returns similar to equities in the current cycle, and a dip in supply makes it a more valuable asset for central banks and investors alike.

Central banks have been buying up gold at a rate not seen since World War II as concerns about geopolitics and the strong dollar see a shift in appreciation for the quintessential risk-free asset.

A broad combination of factors have led to gold’s resurgence, according to the research firm Bernstein. They include geopolitical risk, concerns about government debt, supply issues, and the perception that gold gives better returns over other assets.

“Beyond just the threat of inflation, it is also remarkable that, for the first time since the end of Bretton Woods and, indeed, since the end of the Second World War, central bank buying of gold has actually increased,” a note sent to clients by the firm said on Monday.

Equally, the case for gold purchases is boosted by the near-record levels of government debt in the US, which makes other potential risk-free assets more questionable and could increase inflation figures.

Gold is trading at $1,310 an ounce, up nearly 10% from its recent low in September.

As well as its value related to inflation, gold is likely to see demand increase, while supply will stay “flat at best,” Bernstein said, boosting its value to central banks and investors alike. “As with any other commodity, robust demand and weak supply implies price appreciation,” Bernstein’s analysts wrote.

Gold holdings had been on the decline for years but have seen a clear boost recently.

Bernstein also pointed out that beyond the conversation about central banks’ holdings of gold was its increase in use over jewelry. Both private and public “monetary” holding of gold have overtaken jewelry demand as the primary source of demand growth for gold in recent years, according to Bernstein.

https://www.businessinsider.com/central-banks-buy-gold-at-rate-not-seen-since-wwii-2019-2

Central bank gold buying hits highest level in half a century

  • in 2018, Central banks bought the most gold by volume since 1967.
  • The Russian central bank is leading the way as it looks to reduce its reliance on dollar reserves.

Gold bars sit in a vault at the Perth Mint Refinery, operated by Gold Corp., in Perth, Australia, on Thursday, Aug. 9, 2018.

Carla Gottgens | Bloomberg | Getty Images
Gold bars sit in a vault at the Perth Mint Refinery, operated by Gold Corp., in Perth, Australia, on Thursday, Aug. 9, 2018.

The amount of gold bought by central banks in 2018 reached the second highest annual total on record, according to the World Gold Council (WGC).

Central banks bought the most gold by volume since 1967, according to the industry research firm, which also highlighted it was the largest amount since former U.S. President Nixon Richard’s decision to end the dollar’s peg to bullion in 1971.

Central bank net purchases reached 651.5 metric tons in 2018, 74 percent higher than in the previous year when 375 tons were bought. The WGC has estimated that central banks now hold nearly 34,000 tons of gold.

The Federal Reserve is reported to hold the most, amounting for almost three quarters of the nation’s foreign-exchange reserve pot.

Futures Now: Gold's gleaming rally

Futures Now: Gold’s gleaming rally  

Taking the current spot price of $1,321.15 per troy ounce, gold purchases by central banks in 2018 amounted to a $27.7 billion spending splurge on the precious metal.

“Heightened geopolitical and economic uncertainty throughout the year increasingly drove central banks to diversify their reserves and re-focus their attention on the principal objective of investing in safe and liquid assets,” said the report released on Thursday.

The WGC said the bulk of the buying was carried out by a handful of central banks with Russia leading the way as it looks to swap out dollars from its portfolio. The Russian central bank sold almost all of its U.S. Treasury stock to buy 274.3 tons of gold in 2018.

The central bank of Turkey increased gold reserves by 51.5 tons in 2018. That marked a second consecutive year of net purchases but was 40 percent lower than the volume it bought in 2017.

Other big central bank buyers were Kazakhstan, India, Iraq, Poland and Hungary.

Net sales of gold from central banks remained small, totaling less than 15 tons. Australia, Germany, Sri Lanka, Indonesia and Ukraine accounted for almost all of that figure.

WGC said total gold demand in 2018 reached a total of 4,345.1 tons. The biggest demand came from jewelry which, while flat on the 2017 figure, accounted for just over half of the total. Bars and coins contributed 1,090 tons in 2018, marking a 4 percent rise from the previous year. Gold used in technology climbed marginally to 334.6 tons.

The price of gold has risen around 9 percent in the last three months.

https://www.cnbc.com/2019/01/31/world-gold-council-central-banks-buy-most-gold-since-1967-.html

Central Banks Buy Their Most Gold In Years As They Look To Reduce Risk

Adem Tumerkan November 2, 2018
Category: Research

– This is a repost of the recent Palisade Weekly Letter –

 

Less than a month ago  – Hungary’s Central Bank announced that they increased their gold holdings from 3.1 metric tons to over 31 metric tons.

That’s a tenfold increase – meaning 1,000%. . .

The Hungarian Central Bank governor – Gyorgy Matolcsy – called this a significant move of “economic and national strategic importance”. He also boldly stated that this was a way to improve the security of the small nation’s wealth.

This news comes right after Poland’s recent decision to charge into gold as well. . .

Poland also added nearly 10 metric tons of gold to the country’s reserves in July and August as prices fell.

This marks the country’s largest gold purchase since 1998. And bullion reserves now sit at the highest they have since 1983.

True – Poland and Hungary both still rank outside the world’s top 30 largest gold holders.

And to give you a little context – Russia’s adding 20 tons of gold on average each month to their vaults. . .

So – in the bigger macro picture – their recent gold purchases aren’t that noticeable. And is probably why many mainstream analysts didn’t care much about it.

But it actually is a big deal. . . 

This highlights the trend we’ve seen by central banks charging in to gold since after the 2008 crisis.

I wrote two weeks ago (click here if you missed it) that post-2008, central banks – especially the Emerging Markets – have insatiable gold appetite. And I believe this is helping to put a floor under the price of gold.

Just look for yourself. . .

After two decades of selling – throughout the 1990’s and early 2000’s – central banks worldwide are now diversifying their dollar reserves with gold.

The latest report by the World Gold Council (WGC) showed that central bank gold reserves grew 150 tons in the third-quarter 2018.

That’s up 22% from 2017 – one year ago.

This marks the 8th straight year of central bank gold buying – and the highest level of net purchases since 2015 – both quarterly and year-to-date.

But most importantly – the number of central banks doing the buying was notable.

To name just a few: India – Turkey – Kazakhstan – China – Russia – Poland – Hungary – Iraq – and Mongolia. . .

What did all this buying from various central banks have in common? It was the lower price of gold triggered a buying opportunity. Meaning central bankers wanted to take advantage of the stronger dollar and buy cheaper gold.

Remember – when the dollar’s stronger, gold costs less (i.e. it takes fewer dollars to buy that same gold ounce – vice versa.)

And this trend of heavy central bank buying doesn’t seem like it will be slowing down anytime soon.

According to JP Morgan Chase & Co – central banks will buy another 300-plus tons in 2019. And I expect that to continue throughout the 2020’s.

So – here’s the bigger question. . .

Is all this central bank gold buying signaling trouble in the global economy?

I think so.

Let’s just go over a few troubling issues:

We’ve seen slowing growth in the Emerging Markets, European Union, and China. All while the Federal Reserve continues tightening – spurring a global dollar shortage (read more here).

There’s also the three-plus trillion in Emerging Market debt coming due (i.e. bonds maturing) over the next two-and-a-half years (I just wrote about this problem – you can read here).

With short-term rates rising and a stronger dollar – these debtors will have trouble rolling the debt over (refinancing it). Now markets must worry about a wave of dollar-debt defaults – like we’ve already seen in China this year (read more here).

We also can’t ignore the market beginning to worry about next year’s corporate earnings – which I fully believe will be horrid (more here). Equity prices have been volatile because of this – leaving the NYSE nearly down on the year.

Another troubling indicator is the Chinese currency – the yuan – has devalued significantly over the past few months. It’s getting close to breaking through the $7.00 USD-to-yuan mark.

The last time we saw the yuan devalue so much – August 2015 – global markets imploded.

So yes – it’s no surprise central banks and retail investors are buying gold.

Going back to what Gyorgy Matolcsy – the Hungarian Central Bank Governor – said. . .

‘Gold is key for risk reduction’

Having a certain amount of gold in a portfolio works well to protect against sudden market drops – as I’ve shown previously (read here).

As I wrote then – Just look at the average price of gold during times when the S&P 500 fell more than 15% over the last 20 years. . . You can see that during times when market’s collapse more than 15%, gold positions would do very well. The gold mining equities and warrants do even better. . .”


Therefore – we see that during large market drops – the price of gold increases enough to offset any losses.

But that’s not all. . .

Having gold also improves a portfolio’s Sharpe Ratio.

For those of you that don’t know – the Sharpe Ratio is a popular metric that helps investors understand the return of an investment compared to its risks. Meaning it measures a portfolio’s risk-adjusted returns relative to peers based on a ‘standard deviation’ (a black swan event).

Thus the higher the ratio – the better the risk adjusted returns. . .

And as New Frontier Advisors and U.S. Global Investors discovered – an institutional portfolio with at least 6% weighting in gold has a significantly higher Sharpe Ratio compared to portfolio’s that didn’t have any gold at all.

What this means is – gold in a portfolio greatly reduces volatility without hurting overall returns. . .

Now that we know this – It’s not hard to see why Hungary’s Central Bank Governor increased gold holdings tenfold.

This also helps explain why other central bankers worldwide are opting for gold as well.

That’s because of Balance Sheet Theory – coined by Michael Pettis (one of my favorite economists). 

Balance Sheet Theory basically means that investors – during a crunch period – look at governments and central banks as if they are looking at a corporate balance sheet.

The better the assets are against the liabilities – the more robust things are. . .

But the worst the assets are against growing liabilities – the more fragile things are. . .

And as we watch the Emerging Markets get slaughtered this year in 2018 – it’s not hard to see why. They have horrid balance sheets with mounting liabilities against diminishing assets.

So keep all this in mind when you ask yourself, ‘why are central banks buying so much gold since 2008?’

They are doing it to protect themselves. .

https://palisade-research.com/central-banks-buy-gold/

https://www.usatoday.com/story/news/politics/2019/02/12/national-debt-tops-22-trillion-first-time-ever/2849978002/

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 1202-1207

Listen To Pronk Pops Podcast or Download Shows 1197-1201

Listen To Pronk Pops Podcast or Download Shows 1190-1196

Listen To Pronk Pops Podcast or Download Shows 1182-1189

Listen To Pronk Pops Podcast or Download Shows 1174-1181

Listen To Pronk Pops Podcast or Download Shows 1168-1173

Listen To Pronk Pops Podcast or Download Shows 1159-1167

Listen To Pronk Pops Podcast or Download Shows 1151-1158

Listen To Pronk Pops Podcast or Download Shows 1145-1150

Listen To Pronk Pops Podcast or Download Shows 1139-1144

Listen To Pronk Pops Podcast or Download Shows 1131-1138

Listen To Pronk Pops Podcast or Download Shows 1122-1130

Listen To Pronk Pops Podcast or Download Shows 1112-1121

Listen To Pronk Pops Podcast or Download Shows 1101-1111

Listen To Pronk Pops Podcast or Download Shows 1091-1100

Listen To Pronk Pops Podcast or Download Shows 1082-1090

Listen To Pronk Pops Podcast or Download Shows 1073-1081

Listen To Pronk Pops Podcast or Download Shows 1066-1073

Listen To Pronk Pops Podcast or Download Shows 1058-1065

Listen To Pronk Pops Podcast or Download Shows 1048-1057

Listen To Pronk Pops Podcast or Download Shows 1041-1047

Listen To Pronk Pops Podcast or Download Shows 1033-1040

Listen To Pronk Pops Podcast or Download Shows 1023-1032

Listen To Pronk Pops Podcast or Download Shows 1017-1022

Listen To Pronk Pops Podcast or Download Shows 1010-1016

Listen To Pronk Pops Podcast or Download Shows 1001-1009

Listen To Pronk Pops Podcast or Download Shows 993-1000

Listen To Pronk Pops Podcast or Download Shows 984-992

Listen To Pronk Pops Podcast or Download Shows 977-983

Listen To Pronk Pops Podcast or Download Shows 970-976

Listen To Pronk Pops Podcast or Download Shows 963-969

Listen To Pronk Pops Podcast or Download Shows 955-962

Listen To Pronk Pops Podcast or Download Shows 946-954

Listen To Pronk Pops Podcast or Download Shows 938-945

Listen To Pronk Pops Podcast or Download Shows 926-937

Listen To Pronk Pops Podcast or Download Shows 916-925

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or Download Shows 713-719

Listen To Pronk Pops Podcast or Download Shows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows 151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Advertisements
Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 1158, October 18, 2018, Story 1: American People Demand Enforcement of All Immigration Laws — Deport and Remove All Illegal Aliens — All 30-60 Million — If Trump Cannot Cannot Build Big Beautiful Barrier and Enforce The Law — Find Someone Who Will! — Videos — Story 2: Down The Road To Serfdom With Two Big Government Parties — Beyond The Tipping Point — Videos — Story 3: Fair Tax Less Now — Videos

Posted on October 20, 2018. Filed under: Addiction, American History, Books, Breaking News, Bribery, Bribes, Budgetary Policy, Business, Communications, Congress, Corruption, Countries, Crime, Culture, Defense Spending, Donald Trump, Drugs, Economics, Education, Employment, Energy, Fiscal Policy, Free Trade, Freedom of Speech, Government, High Crimes, History, House of Representatives, Illegal Drugs, Illegal Drugs, Labor Economics, Legal Drugs, Medicare, Radio, Raymond Thomas Pronk, Senate, Socials Security, Success, Tax Fraud, Tax Policy, Taxation, Taxes, Technology, United States of America, Videos, Violence, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

 

 

 Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 1158 October 18, 2018

Pronk Pops Show 1157 October 16, 2018

Pronk Pops Show 1156 October 15, 2018

Pronk Pops Show 1155 October 12, 2018

Pronk Pops Show 1154 October 11, 2018

Pronk Pops Show 1153 October 10, 2018

Pronk Pops Show 1152 October 5, 2018

Pronk Pops Show 1151 October 4, 2018

Pronk Pops Show 1150 October 3, 2018

Pronk Pops Show 1149, October 1, 2018

Pronk Pops Show 1148, September 28, 2018

Pronk Pops Show 1147, September 27, 2018

Pronk Pops Show 1146, September 25, 2018

Pronk Pops Show 1145, September 24, 2018

Pronk Pops Show 1144, September 20, 2018

Pronk Pops Show 1143, September 19, 2018

Pronk Pops Show 1142, September 18, 2018

Pronk Pops Show 1141, September 17, 2018

Pronk Pops Show 1140, September 14, 2018

Pronk Pops Show 1139, September 13, 2018

Pronk Pops Show 1138, September 12, 2018

Pronk Pops Show 1137, September 7, 2018

Pronk Pops Show 1136, September 6, 2018

Pronk Pops Show 1135, September 5, 2018

Pronk Pops Show 1134, September 4, 2018

Pronk Pops Show 1133, August 29, 2018

Pronk Pops Show 1132, August 28, 2018

Pronk Pops Show 1131, August 27, 2018

Pronk Pops Show 1130, August 22, 2018

Pronk Pops Show 1129, August 21, 2018

Pronk Pops Show 1128, August 20, 2018

Pronk Pops Show 1127, August 17, 2018

Pronk Pops Show 1126, August 16, 2018

Pronk Pops Show 1125, August 15, 2018

Pronk Pops Show 1124, August 14, 2018

Pronk Pops Show 1123, August 13, 2018

Pronk Pops Show 1122, August 9, 2018

Pronk Pops Show 1121, August 8, 2018

Pronk Pops Show 1120, August 6, 2018

Pronk Pops Show 1119, August 2, 2018

Pronk Pops Show 1118, August 1, 2018

Pronk Pops Show 1117, July 31, 2018

Pronk Pops Show 1116, July 30, 2018

Pronk Pops Show 1115, July 26, 2018

Pronk Pops Show 1114, July 25, 2018

Pronk Pops Show 1113, July 24, 2018

Pronk Pops Show 1112, July 23, 2018

Pronk Pops Show 1111, July 19, 2018

Pronk Pops Show 1110, July 18, 2018

Pronk Pops Show 1109, July 17, 2018

Pronk Pops Show 1108, July 16, 2018

Pronk Pops Show 1107, July 12, 2018

Pronk Pops Show 1106, July 11, 2018

Pronk Pops Show 1105, July 10, 2018

Pronk Pops Show 1104, July 9, 2018

Pronk Pops Show 1103, July 5, 2018

Pronk Pops Show 1102, JUly 3, 2018

Pronk Pops Show 1101, July 2, 2018

Image result for branco cartoons caravan of illegalsImage result for branco cartoons caravan of illegalsImage result for branco cartoons caravan of illegalsImage result for branco cartoons caravan of illegals

Image result for branco cartoons caravan of illegals

Story 1: American People Demand Enforcement of All Immigration Laws — Deport and Remove All Illegal Aliens — All 30-60 Million — If Trump Cannot Cannot Build Big Beautiful Barrier and Enforce The Law — Find Someone Who Will! — Videos

US reaches deal with Mexico to stop migrant caravan: Fox News report

Ingraham: The caravan of lies and manipulation

A Nation of Immigrants

Immigration, World Poverty and Gumballs – NumbersUSA.com

Tucker Carlson Tonight 10/18/18 | Breaking Fox News Today | October 18, 2018

 

Donald Trump Suggests Someone Is Paying Migrants in Caravan

Honduran migrants take part in a caravan heading toward the U.S. in Chiquimula, Guatemala on October 17. Currently, the group is making its way through Guatemala and it is unclear whether it will be allowed to enter Mexico.

 

President Donald Trump suggested Thursday that someone was paying migrants in the caravan traveling to the United States from Honduras.

“We’re starting to find out, and I won’t say 100 percent, I’ll put a little tiny question mark at the end … but a lot of money has been passing through people to come up and try to get to the border by election day,” Trump said during a campaign rally in Montana.

The group of over 4,000 migrants is currently traveling through Guatemala, although the president did not cite evidence on Thursday to back his claim that some of them could be paid.

The president said the caravan would be stopped before they reached the border, mocking Democrats for trying to influence the immigration issue.

“They wanted that caravan, and there are those who say that caravan didn’t just happen,” Trump said.

He told supporters the Mexican government would “hopefully” stop the caravan before it reached their own Southern border.

If Mexico failed, he reassured the crowd, he would send the military to the Southern border.

He ripped Democrats for favoring illegal immigration, accusing them of wanting to import more voters into the United States.

“Hey, they’re not so stupid when you think about it,” he said. “But they are crazy.”

Trump repeated that he needed more Republicans in Congress to help him change the immigration laws, calling them the “worst in the world” for allowing migrants to claim asylum and get released into the country.

He admitted that the flood of migrants coming into the country was “his fault.”

“I caused it because I have created such an incredible economy and I have created so many jobs, I have made this country so great that everybody wants to come in!”

INVASION USA

BORDER CARAVAN PUTS TRUMP LEGACY ON THE LINE

Pat Buchanan: How president handles issue will determine November election, 2020

Our mainstream media remain consumed with the grisly killing of Washington Post columnist Jamal Khashoggi in the Saudi consulate in Istanbul, and how President Donald Trump will deal with Crown Prince Mohammed bin Salman.

Understandably so, for this is the most riveting murder story since O.J. Simpson and has strategic implications across the Middle East.

Yet far more critical to the future of our civilization is the ongoing invasion of the West from the Third World.

Consider the impact of the decision by Chancellor Angela Merkel in 2015 to throw open Germany’s doors to 1 million refugees from Syria’s civil war.

Last weekend, in a crushing blow to Merkel, the Christian Social Union, the Bavarian sister party of her CDU, won its smallest share of the vote in half a century, 37 percent. Her coalition party, the SPD, saw its share of the Bavarian vote fall to a historic low of less than 10 percent.

The right-wing Alternative for Deutchland saw its support rise to 10 percent and has become a force in German politics. Some conservatives are urging the CDU to adopt the AfD hardline on illegal immigration.

The message sent by the Bavarian electorate is the message voters across Europe have been sending to their own capitals for years: You are failing in your first duty – defense of the homeland from foreign invasion. Mass migration of unassimilable peoples and cultures from a global South represents an existential threat to our Europe.

As Merkel’s chancellorship approaches its end, French President Emmanuel Macron, her progressive EU partner, has seen his approval fall to below 30 percent.

The U.S.-led NATO alliance may guard the Baltic and Black Sea regions against a Russian invasion from the east. But in Central, Southern and Western Europe, the more feared invaders are the peoples of Africa and the Muslim world, whose numbers are expected to triple or quadruple by this century’s end.

And as their numbers grow, so, too, does their desperation to escape, even at risk of their lives, the poverty, wars and repression of their homelands to cross the Med and fill the empty spaces left by a depopulating Europe.

It also now appears that the U.S. elections, not three weeks away, may be affected by another immigration crisis on the U.S. border.

As of Thursday, a caravan of 4,000 refugees without visas had crossed from Honduras into Guatemala and was heading toward Mexico. By Election Day, it will either have been stopped, or it will be here. And this caravan is a portent of things to come.

According to the Washington Post, during FY 2018, which ended last month, 107,212 members of “family units” crossed over into the U.S., “obliterating the previous record of 77,857 set in 2016.”

Citing DHS figures, the Post adds, “Border patrol agents arrested 16,658 family members in September alone, the highest one-month total on record and an 80 percent increase from July.”

When Trump, under intense political fire, ended his “zero tolerance” policy of separating refugees from their children, this message went out to Mexico and Central America:

Bring your kids with you when you cross the border. They will have to stay with you, and they cannot be held for more than 20 days. Thus, when they are released, you will be released to await a hearing on your claim of asylum. The odds are excellent that you can vanish into the U.S. population and never be sent back.

Enraged, Trump has threatened to cut off aid to El Salvador, Honduras and Guatemala if they do not stop the caravans and has warned Mexico he will use the U.S. military to secure our border.

Unwanted mass migration is the issue of our time, as there is no foreseeable end to it before it alters America irremediably.

As these migrants are almost all poor, not highly skilled and do not speak English, most will join that segment of our population that pays no income taxes but qualifies for social welfare benefits like food stamps, medical care and free education in our public schools.

They are thus a net drain upon the resources of a nation that is already, at full employment, running a deficit of $779 billion a year.

These migrants, however, are a present and future benefit to the Democratic Party that built and maintains our mammoth welfare state, and which, in presidential elections, routinely wins 70 to 90 percent of the votes of people whose trace their ancestry to Asia, Africa and Latin America.

Not without reason, Democrats believe that if they can change the composition of the American electorate, they can control America forever.

If Donald Trump was elected on any one issue, it was immigration and his promises to secure the border, build the wall and halt the invasion.

How he deals with the impending crisis of the migrant caravan may affect both the fate of his party in November and his presidency in 2020.

 https://www.wnd.com/2018/10/border-caravan-puts-trump-legacy-on-the-line/#pmkuiiM0qr6G9cjL.99

Story 2: Down The Road To Serfdom With Two Big Government Parties — Beyond The Tipping Point — Videos

How Did The U.S. End Up With A Two-Party System?

How the Republican Party went from Lincoln to Trump

Ben Shapiro: 7 Myths of Democratic Socialism Debunked

Why “Democratic” Socialism Doesn’t Work

Marxism is ignorant of the Pareto principle | Jordan Peterson & Bret Weinstein

Sean Hannity 10/18/18 | Hannity Breaking Fox News | October 18, 2018

Story 3: Fair Tax Less Now — Videos

FairTax: Fire Up Our Economic Engine (Official HD)

Rep. Woodall Talks FairTax – Tax Week 2018

Freedom from the IRS! – FairTax Explained in Detail

The Case for the Fair Tax

Pence on the Fair Tax

Tax reform will prolong long-term economic forecast for US, says Rep. Kevin Brady

Neal Boortz FAIRtax vs Republican Tax Plan

What If There Were No Taxes?

Big Government Kills Small Businesses

Taxes Are Killing Small Businesses

Is America’s Tax System Fair?

Why Do American Companies Leave America?

Why Private Investment Works & Govt. Investment Doesn’t

Lower Taxes, Higher Revenue

The Progressive Income Tax: A Tale of Three Brothers

The War on Work

Kamala Harris and other prominent Democrats want to repeal Trump’s tax cuts and replace them with cash payouts for the poor and working class

  • With midterm elections 2½ weeks away and the 2020 presidential race around the corner, prominent Democrats are embracing an ambitious idea: Repeal and replace the $1.5 trillion Republican tax plan.
  • The proposals would get rid of the tax cuts and, in turn, funnel that money into government-guaranteed cash for low- and middle-income households.
  • Possible White House contender Sen. Kamala Harris announced a plan this week that would give working families up to $6,000 each year, with the option of receiving monthly payments.

Senator Kamala Harris, a Democrat from California, questions Gina Haspel, director of the Central Intelligence Agency (CIA) nominee for President Donald Trump, not pictured, during a Senate Intelligence Committee confirmation hearing in Washington, D.C., 

Andrew Harrer | Bloomberg | Getty Images
Senator Kamala Harris, a Democrat from California, questions Gina Haspel, director of the Central Intelligence Agency (CIA) nominee for President Donald Trump, not pictured, during a Senate Intelligence Committee confirmation hearing in Washington, D.C.,

With midterm elections 2½ weeks away and the 2020 presidential race around the corner, prominent Democrats are embracing an ambitious idea: Repeal and replace the $1.5 trillion Republican tax plan.

The proposals would get rid of the tax cuts and, in turn, funnel that money into government-guaranteed cash for low- and middle-income households.

Sen. Kamala Harris, D-Calif., announced a plan this week that would give working families up to $6,000 each year, with the option of receiving monthly payments. Sen. Sherrod Brown, D-Ohio, and Rep. Ro Khanna, D-Calif., outlined a similar idea last year. A bill from Rep. Bonnie Watson Coleman, D-N.J., would allow family caregivers and students to receive the money as well.

Facebook co-founder on how tax cuts and economic growth impact investments

Facebook co-founder on how tax cuts and economic growth impact investments  

“The idea was to provide a clear contrast with Donald Trump,” Khanna told CNBC in an interview. “You know what you could actually do with this money? You could give anyone making under $75,000 a raise.”

The measures are significantly more dramatic than some previous Democratic proposals – a reflection of the proximity to the midterm elections and the early interest surrounding the presidential race in 2020. Harris and Brown are potential contenders for the White House, and Democrats have been seeking bold ideas to present to their energized electorate.

“You know what you could actually do with this money? You could give anyone making under $75,000 a raise.”-Rep. Ro Khanna, D-Calif.

“There’s all kind of evidence that voters are not looking for incremental solutions,” said Adam Ruben, campaigns director at the Economic Security Project, a liberal think tank that has pushed the idea. “They’re looking for a big vision of how to pick up all the people who have been left behind in this economy.”

Harris’ plan would create a new tax credit of up to $3,000 for individuals or $6,000 for households. They could opt to receive the money in a lump sum after filing their annual tax return or in monthly installments of $250 to $500, which Harris said could help reduce reliance on payday lenders. The credit would be refundable, which means workers would receive the money even if they don’t owe any taxes. Households earning up to $100,000 would be eligible.

The bill shares many of the same elements of an earlier bill from Brown and Khanna. Their proposal would expand the existing earned income tax credit up to roughly $12,000 for a family with three children. The money could also be paid monthly, but it would only cover households earning up to about $76,000. The lawmakers introduced the bill last fall with more than 50 co-sponsors in the House; no other senators signed on to the measure at the time.

Trump agenda, attitude overshadow tax cuts for GOP in midterms

Trump agenda, attitude overshadow tax cuts for GOP in midterms  

“We’ve seen the debate shift,” Khanna said. “My hope is that other presidential candidates will look at the Brown plan and embrace it as the alternative to Trump.”

Ruben said his organization has spoken with other potential Democratic candidates about the idea but declined to specify whom. Earlier this year, Senate Democrats announced a more modest proposal to roll back the GOP tax cuts: Move the top tax rate for individuals back to 39 percent, raise the corporate tax rate 4 percentage points to 25 percent and reinstate the alternative minimum tax.

Rep. John Delaney, D-Md., who has announced he is running in 2020, has called for nudging the corporate tax rate up to 23 percent to pay for $1 trillion in infrastructure spending. He told CNBC he also supports expanding the earned income tax credit but did not say by how much.

“We must reform our tax code in a way that is fiscally responsible, addresses our long-term economic competitiveness needs and helps working families,” he said in a statement.

Indeed, the new tax credits come with a hefty price tag. Brown and Khanna’s plan is expected to cost about $1.4 trillion – just about what the Republican tax plan costs. Harris’ bill is likely to be in the same ballpark. That’s why liberals say repealing the current law is a critical component of their plan.

Yet Democrats have repeatedly attacked the GOP tax cuts for ballooning the deficit. And while they argue that the new credits would support long-term economic growth, they are not claiming such a plan would pay for itself.

Rohit 'Ro' Khanna

David Paul Morris | Bloomberg | Getty Images
Rohit ‘Ro’ Khanna

Republicans are preparing for battle.

The conservative Heritage Foundation released an analysis this week showing repealing the tax cuts in 2020 would cost the average household nearly $27,000 in lost take-home pay over the next decade. Some of the decline is due to higher individual tax rates, said Adam Michel, a policy analyst at Heritage and one of the authors of the report. But most of it is the result of lower economic growth because of higher corporate rates, he said.

“That’s where a lot of the juice comes from,” Michel said. “That’s the thing I’m frankly most concerned about.”

Democrats have also criticized the GOP for passing its sweeping tax plan with a party-line vote. Yet it seems unlikely that any Republicans would support repealing and replacing what GOP leadership has dubbed the “crown jewel” of its legislative agenda.

“The tax cuts launched our booming economy into the stratosphere and anybody advocating for repeal will have to explain why they want to reverse the jobs and wage growth our country has seen since the law passed,” said John Ashbrook, a Republican strategist who worked under Senate Majority Leader Mitch McConnell.

The Nov. 6 elections will be a testing ground for the Democratic agenda, and Economic Security Project’s Ruben said the Democratic Party will need fresh thinking to connect with voters in 2020.

“People want to feel the confidence that someone is going to fight for them and push for big changes and not let classic Washington gridlock or the constrained sense of what is acceptable in politics get in the way,” he said.

https://www.cnbc.com/2018/10/19/kamala-harris-democrats-push-to-repeal-and-replace-trump-tax-cuts.html

 

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 1151-1158

Listen To Pronk Pops Podcast or Download Shows 1145-1150

Listen To Pronk Pops Podcast or Download Shows 1139-1144

Listen To Pronk Pops Podcast or Download Shows 1131-1138

Listen To Pronk Pops Podcast or Download Shows 1122-1130

Listen To Pronk Pops Podcast or Download Shows 1112-1121

Listen To Pronk Pops Podcast or Download Shows 1101-1111

Listen To Pronk Pops Podcast or Download Shows 1091-1100

Listen To Pronk Pops Podcast or Download Shows 1082-1090

Listen To Pronk Pops Podcast or Download Shows 1073-1081

Listen To Pronk Pops Podcast or Download Shows 1066-1073

Listen To Pronk Pops Podcast or Download Shows 1058-1065

Listen To Pronk Pops Podcast or Download Shows 1048-1057

Listen To Pronk Pops Podcast or Download Shows 1041-1047

Listen To Pronk Pops Podcast or Download Shows 1033-1040

Listen To Pronk Pops Podcast or Download Shows 1023-1032

Listen To Pronk Pops Podcast or Download Shows 1017-1022

Listen To Pronk Pops Podcast or Download Shows 1010-1016

Listen To Pronk Pops Podcast or Download Shows 1001-1009

Listen To Pronk Pops Podcast or Download Shows 993-1000

Listen To Pronk Pops Podcast or Download Shows 984-992

Listen To Pronk Pops Podcast or Download Shows 977-983

Listen To Pronk Pops Podcast or Download Shows 970-976

Listen To Pronk Pops Podcast or Download Shows 963-969

Listen To Pronk Pops Podcast or Download Shows 955-962

Listen To Pronk Pops Podcast or Download Shows 946-954

Listen To Pronk Pops Podcast or Download Shows 938-945

Listen To Pronk Pops Podcast or Download Shows 926-937

Listen To Pronk Pops Podcast or Download Shows 916-925

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows 151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 1126, August 16, 2018, Story 1: Aretha Franklin, The Queen of Soul, Passes Away at 76 — Respect — Think — I Say A Little Prayer — (You Make Me Feel Like) A Natural Woman — Videos — Story 2: The Press Strikes Back At President Trump’s Fake News Enemy of The People Charge — American People Do Not Trust Big Lie Media (Television News and City Newspapers) Progressive Propaganda — Videos 

Posted on August 17, 2018. Filed under: Addiction, American History, Blogroll, Breaking News, Center for Disease Control, Communications, Corruption, Countries, Culture, Deep State, Defense Spending, Diet, Diseases, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Drugs, Eating, Education, Elections, Exercise, Federal Government, First Amendment, Food, Food, Freedom of Speech, Gangs, Government, Government Dependency, Government Spending, Hate Speech, Health, Health Care, History, Human, Human Behavior, Independence, Language, Law, Legal Drugs, Life, Lying, Media, Medicare, Music, National Interest, Networking, News, Nutrition, Obama, Obesity, Overweight, People, Philosophy, Photos, Politics, Polls, President Trump, Radio, Raymond Thomas Pronk, Rule of Law, Scandals, Second Amendment, Social Networking, Socials Security, Spying, Success, Surveillance and Spying On American People, Surveillance/Spying, United States of America, Videos, Wealth, Weather, Wisdom | Tags: , , , , , , , , , |

 

 Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 1126, August 16, 2018

Pronk Pops Show 1125, August 15, 2018

Pronk Pops Show 1124, August 14, 2018

Pronk Pops Show 1123, August 13, 2018

Pronk Pops Show 1122, August 9, 2018

Pronk Pops Show 1121, August 8, 2018

Pronk Pops Show 1120, August 6, 2018

Pronk Pops Show 1119, August 2, 2018

Pronk Pops Show 1118, August 1, 2018

Pronk Pops Show 1117, July 31, 2018

Pronk Pops Show 1116, July 30, 2018

Pronk Pops Show 1115, July 26, 2018

Pronk Pops Show 1114, July 25, 2018

Pronk Pops Show 1113, July 24, 2018

Pronk Pops Show 1112, July 23, 2018

Pronk Pops Show 1111, July 19, 2018

Pronk Pops Show 1110, July 18, 2018

Pronk Pops Show 1109, July 17, 2018

Pronk Pops Show 1108, July 16, 2018

Pronk Pops Show 1107, July 12, 2018

Pronk Pops Show 1106, July 11, 2018

Pronk Pops Show 1105, July 10, 2018

Pronk Pops Show 1104, July 9, 2018

Pronk Pops Show 1103, July 5, 2018

Pronk Pops Show 1102, JUly 3, 2018

Pronk Pops Show 1101, July 2, 2018

Pronk Pops Show 1100, June 28, 2018

Pronk Pops Show 1099, June 26, 2018

Pronk Pops Show 1098, June 25, 2018 

Pronk Pops Show 1097, June 21, 2018

Pronk Pops Show 1096, June 20, 2018

Pronk Pops Show 1095, June 19, 2018

Pronk Pops Show 1094, June 18, 2018

Pronk Pops Show 1093, June 14, 2018

Pronk Pops Show 1092, June 13, 2018

Pronk Pops Show 1091, June 12, 2018

Pronk Pops Show 1090, June 11, 2018

Pronk Pops Show 1089, June 7, 2018

Pronk Pops Show 1088, June 6, 2018 

Pronk Pops Show 1087, June 4, 2018

Pronk Pops Show 1086, May 31, 2018

Pronk Pops Show 1085, May 30, 2018

Pronk Pops Show 1084, May 29, 2018

Pronk Pops Show 1083, May 24, 2018

Pronk Pops Show 1082, May 23, 2018

Pronk Pops Show 1081, May 22, 2018

Pronk Pops Show 1080, May 21, 2018

Pronk Pops Show 1079, May 17, 2018

Pronk Pops Show 1078, May 16, 2018

Pronk Pops Show 1077, May 15, 2018

Pronk Pops Show 1076, May 14, 2018

Pronk Pops Show 1075, May 10, 2018

Pronk Pops Show 1073, May 8, 2018

Pronk Pops Show 1072, May 7, 2018

Pronk Pops Show 1071, May 4, 2018

Pronk Pops Show 1070, May 3, 2018

Pronk Pops Show 1069, May 2, 2018

See the source imageSee the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source imageSee the source image

See the source image

See the source image

Story 1: Aretha Franklin, The Queen of Soul, Passes Away at 76 — Respect — I Say A Little Prayer — Videos —

See the source imageSee the source image

See the source imageSee the source image

See the source image

See the source imageSee the source image

Aretha Franklin Respect 1967 HD YouTube

Aretha Franklin – Think (The Blues Brothers Version)

Aretha Franklin – I say a little prayer

Aretha Franklin – I Say A Little Prayer: her very best performance!

Watch Aretha Franklin Make President Obama Emotional

Aretha Franklin – (You Make Me Feel Like) A Natural Woman [1967]

Aretha Franklin – Amazing Grace (Live 2014)

Aretha Franklin – I Say A Little Prayer

Tributes pour in for Aretha Franklin

Aretha Franklin Makes An EMOTIONAL Statement About Her Health & Addresses Weight Loss

Dr. John Chabot on Obesity and Pancreatic Cancer

Pancreatic Cancer and Obesity Directly Linked

Pancreatic Cancer Rates Are Increasing

Why few survive the pancreatic cancer that killed Aretha Franklin

Aretha Franklin ‘gravely ill with pancreatic cancer’ as family ‘says goodbye’ – Daily News

Aretha Franklin dies at age 76: Special Report

`Queen of Soul’ Aretha Franklin Has Died

Queen of Soul’ Aretha Franklin Passes Away At Age 76 | NBC News

Aretha Franklin, the Queen of Soul, dies at 76

How America reacts to Aretha Franklin’s passing: Sherwin Bryce-Pease

The Aretha Franklin 60 Minutes Interview

‘She worked for me on numerous occasions’: Donald Trump’s tribute to Aretha Franklin

Aretha Franklin’s impact on Detroit church and community

Aretha Franklin on The Wendy Williams Show: Part 1

Aretha Franklin on The Wendy Williams Show: Part 2

Aretha Franklin’s Most Memorable Moments (RIP)

Sad News, Stevie Wonder makes a HEARTBREAKING confession About Aretha Franklin.

Aretha Franklin dies at 76: Detroit star transformed American music

Aretha Franklin dies at 76

Aretha Franklin, whose impassioned, riveting voice made her a titan of American music, has died, her niece, Sabrina Owens, confirmed to the Free Press. She was 76.

She died at 9:50 a.m. surrounded by family at her home in Detroit.

A family statement released by her publicist Gwendolyn Quinn said “Franklin’s official cause of death was due to advance pancreatic cancer of the neuroendocrine type, which was confirmed by Franklin’s oncologist, Dr. Philip Phillip of Karmanos Cancer Institute” in Detroit.

The family added: “In one of the darkest moments of our lives, we are not able to find the appropriate words to express the pain in our heart. We have lost the matriarch and rock of our family.”

Also read: 

Franklin was the loftiest name in the rich history of Detroit music and one of the transcendent cultural figures of the 20th Century. Raised on an eclectic musical diet of gospel, R&B, classical and jazz, she blossomed out of her father’s Detroit church to become the most distinguished black female artist of all time, breaking boundaries while placing nearly 100 hits on Billboard’s R&B chart — 20 of them reaching No. 1.

The Queen of Soul, as she was coronated in the 1960s, leaves a sprawling legacy of classic songs that includes “Respect,” “(You Make Me Feel Like) A Natural Woman,” “Chain of Fools,” “Baby I Love You,” “Angel,” “Think,” “Rock Steady,” “Bridge Over Troubled Water” and “Freeway of Love,” along with a bestselling gospel catalog.

Her death follows several years of painstakingly concealed medical issues, which led to regular show cancellations and extended absences from the public eye.

Visibly feeble but still summoning magic from her voice, Franklin played her final Detroit show in June 2017, an emotion-packed concert for thousands at an outdoor festival downtown.

She ended the performance with a then-cryptic appeal to the hometown crowd: “Please keep me in your prayers.”

Read more:

The Queen of Soul sang for presidents and royalty, and befriended high-profile leaders such as the Revs. Martin Luther King Jr. and Jesse Jackson. Amid the global glitter and acclaim, she remained loyal to her home region, living in the Detroit area for decades, including the Bloomfield Hills house where she moved in the late 1980s. She moved back to Detroit in summer 2017, buying an apartment at Riverfront Towers outside downtown.

“My roots are there. The church is there. My family is there,” she told the Free Press in 2011. “I like the camaraderie in Detroit, how we’ll rally behind something that’s really worthy and come to each other’s assistance.”

Franklin’s voice was a singular force, earning her a multitude of laurels through the decades, including 18 Grammy Awards, the Presidential Medal of Freedom and honorary doctorates from a host of institutions. In 1987, she became the first female artist inducted into the Rock and Roll Hall of Fame,and seven years later, at age 52, the youngest recipient of a Kennedy Center Honor.

Franklin topped Rolling Stone magazine’s 100 Greatest Singers of All Time list, and her signature hit, “Respect,” ranked No. 4 on “Songs of the Century,” a 1999 project by the National Endowment for the Arts. She performed at the inaugurations of U.S. presidents Bill Clinton and Barack Obama, garnering global attention at the latter for her big felt hat with its crystal-studded bow — a piece of wardrobe now in the Smithsonian Institution.

Franklin’s influence is vast and indelible. It’s most obviously heard in the myriad voices that followed her, from Mary J. Blige to Adele, and even male singers like Luther Vandross.

But just as important is Franklin’s broader social impact: She embodied American black culture, emphatically and without apology, and through sheer force of talent, thrust it onto the global stage.

Franklin revolutionized black music and the way it was absorbed and perceived, helping create a world where we take for granted that a Beyoncé can reign atop mainstream popular culture.

Read more:

Franklin was emotionally complex, a woman who relished her diva status but whose vulnerabilities and insecurities always seemed to lurk just beneath. Her public success masked a private life of turbulence and loss, making for an intriguing character driven by conflicting forces: Franklin was sassy but naturally shy, urbane but down-home, confident but reckless.

That deep, complicated humanity imbued her music with authenticity. Franklin’s singing, soaked in feeling and executed with virtuoso skill, moved seamlessly among styles: gospel, soul, pop, blues, R&B, jazz, even opera. She belted, purred, seduced, testified. Even as the propulsive power left her voice in later years, she remained as expressive as ever, and her live performances continued to earn critical acclaim.

“I must do what is real in me in all ways,” she told Ebony magazine in 1967, the year when a string of hit singles — “Respect,” “Baby I Love You,” “Chain of Fools” — gave Franklin her first major crossover success.

Franklin’s early life

Born in Memphis on March 25, 1942, Franklin moved at age 4 to Detroit when her father, the Rev. C.L. Franklin, took over duties at New Bethel Baptist Church.

Turmoil set in early: Her mother left Detroit for Buffalo, N.Y., when Aretha was 6, and died four years later.

Still, Franklin grew up in an environment ideal for nurturing her skills. Her charismatic father was a preacher and singer with a national reputation, with sermons that became top-selling records and a gospel revue that toured the country. That brought important musical figures into the young singer’s orbit, including household guests such as James Cleveland, Mahalia Jackson, B.B. King and Sam Cooke. Growing up on Detroit’s northwest side, she was a childhood friend of Smokey Robinson.

She became a singing prodigy at New Bethel, and her sisters, Carolyn and Erma, also honed their gospel skills. But it was Aretha who steadily emerged as the standout, and by age 14 she was accompanying her father on his gospel travels.

Gospel was the main focus, but the Franklin household was teeming with all manner of music.

“I heard classical music from the beginning. It was always in our home,” she told the Free Press in 2011. “As a teenager I took more to the R&B, but I always loved classical.”

R&B music, frowned upon by many in the traditional gospel world, was also welcome in the house. The Rev. Franklin, progressive in politics and disposition, put up little resistance to the secular sounds exemplified by artists such as Cooke.

The young Aretha absorbed the emotional power of music in its many forms, whether in the throes of an ecstatic congregation or the intimacy of close listening.

Read more:

“(My older sister) Erma was a big fan of ‘Be My Love’ by Mario Lanza,” she recalled. “How many times did we hear that in our house?! Sylvia Robinson, Smokey’s sister, used to visit Erma and play ‘Be My Love,’ pressing their ears against the speakers, just crying.

“I was quite young at the time, and I thought it was very funny that these girls were crying with their ears against the speaker. I didn’t do that with the artists I heard (then) — Frankie Lymon, the Clovers, LaVern Baker, Ray Charles. As an adult I began to perfectly understand it. When I heard someone knocking me out, I thought, ‘OK, so this is what that was about.’”

In 1960, at age 18, Franklin spurned a hometown offer from Berry Gordy’s fledgling Motown label and opted to sign with New York’s Columbia Records, where her demo tape had caught the ear of iconic talent scout John Hammond. A year later — shortly after Franklin married her manager, Ted White — her Columbia debut was released.

That record set the tone for her five-year, nine-album tenure at Columbia, where she was groomed as an interpreter of jazz and pop standards, presented as a chanteuse at the piano.

Franklin was quietly masterful at the keyboard. Throughout her career, it was a skill overshadowed by her voice — although she played piano on most of the work for which she’s now remembered.

The Columbia period proved fruitful but frustrating for the young singer, helping expand her talent while sticking a bridle on the gospel-honed voice behind it. Even as her critical reputation and live draw grew, she managed only a handful of minor hits.

“It’s a fast track to the top if you’ve really got it going on. But I like the way I came up in the industry,” she told the Free Press in 2014. “It wasn’t too fast. It wasn’t overnight, but (rather) little by little. And gradually I grew in the industry. I like that more than the overnight sensation, as one might put it. I was able to learn along the way and grow at a very, very nice pace. My pace, really. I wasn’t thrust into anything I wasn’t ready for.”

Real success blossomed in 1967, when the 24-year-old Franklin declined to renew her Columbia contract and signed with Atlantic Records, where executives Ahmet Ertegun and Jerry Wexler saw a chance to unleash the raw power of Franklin’s vocals. Her first Atlantic single — “I Never Loved a Man (The Way I Love You)” — was cut at the burgeoning soul-music hotbed FAME Studios in Muscle Shoals, Ala.

Within weeks it was Franklin’s first No. 1 on Billboard’s R&B chart, cracking the pop Top 10 as well. She was on her way to mainstream success.

As with so much of her coming work, the performance on “I Never Loved a Man” was fueled by a deep intensity but with an intimate, welcoming feel that helped Franklin connect with listeners across the board.

“She has never learned how to be pretentious enough to build a false image, and deeply identifies with people on all levels,” Ebony wrote that year, going on to quote Franklin:

“Everybody who’s living has problems and desires just as I do,” she told the magazine. “When the fellow on the corner has somethin’ botherin’ him, he feels the same way I do. When we cry, we all gonna cry tears, and when we laugh, we all have to smile.”

‘Respect’ and the ascension to fame

Franklin’s career quickly skyrocketed: With Wexler overseeing sessions and many of the Muscle Shoals players recruited to Atlantic’s New York studio, Franklin recorded a flurry of hits in the ensuing months, all of them enduring for decades as staples of her repertoire: “Respect,” “Baby I Love You,” “(You Make Me Feel Like) A Natural Woman,” “Chain of Fools, “Ain’t No Way.” She was backed on many by sisters Carolyn and Erma, who enjoyed modest solo success of their own.

Franklin was no one’s puppet in the studio: Even in her earliest years, she was assertive during record sessions, crafting arrangements and dictating commands to seasoned musicians many decades her senior.

By ’68, Franklin was an iconic figure in the African-American community — “the Queen of Soul,” as she was christened by the black press. She was now inescapably important: Franklin’s status was seconded by mainstream America that summer when she graced the cover of Time magazine.

While Franklin was not often explicitly political in public, she embraced her anointed role just as the black pride movement was flowering. “Respect,” in particular, took on anthem-like stature, hailed as a bold feminist and civil-rights statement — though Franklin long insisted she had no grand designs when she recorded the Otis Redding tune about household relationships.

On Feb. 16, 1968 — declared “Aretha Franklin Day” by Detroit Mayor Jerome P. Cavanagh — she performed a celebratory hometown show for 12,000 at Cobo Arena. In attendance was the Rev. Martin Luther King Jr., two months before his assassination, and he took the stage to present Franklin with an award on behalf of his Southern Christian Leadership Council.

As would become typical of Franklin’s story, the outward success masked drama behind the scenes. The marriage to White, in particular, had become fraught, marked by domestic violence. By 1969, they were divorced. She would go on to wed actor Glynn Turman in 1978, a marriage that lasted six years.

Read more:

The hits continued to pile up. By the end of the 1960s she had placed 28 songs in the R&B Top 40, a mix of original material and eclectic cover songs, including work by the Beatles (“Eleanor Rigby”) and the Band (“The Weight”). The momentum carried into the following decade, with a string of hit records and a 1972 gospel album, “Amazing Grace,” that became one of the genre’s all-time best sellers.

Success on the R&B side continued in the ’70s even as the pop hits tapered off, though 1976’s “Sparkle” soundtrack produced one of Franklin’s abiding crossover classics, the Curtis Mayfield-penned “Something He Can Feel.” A scene-stealing appearance in the 1980 comedy “The Blues Brothers,” where Franklin performed as a waitress belting out “Think,” was a colorful introduction for a younger generation.

That same year, searching for a new musical direction, Franklin signed with Arista Records, where mogul Clive Davis helped groom a fresh career path for the singer, now approaching 40.

After several tries, the 1985 album “Who’s Zoomin’ Who” became the mainstream smash they sought, producing the hit “Freeway of Love” and placing Franklin in front of the MTV audience. A duet with George Michael, “I Knew You Were Waiting (For Me),” topped the global charts two years later.

Franklin, who had spent much of the 1970s in Los Angeles, was now permanently resettled in metro Detroit, with several area properties including the Bloomfield Hills residence that would remain her primary home for the next three decades. Her reverend father had died in 1984 after a five-year coma; he’d been shot during an attempted robbery at his Detroit home.

The 1990s saw Franklin growing into the role of elder soul stateswoman, satisfied with her status as one of pop history’s greats and playing up the diva role that had become an integral facet of her persona. While the studio pace slowed — she released just five albums from 1998 through her death — her latter-day music was generally well received, with Grammy nominations for “A Rose Is Still a Rose” (1998) and “So Damn Happy” (2003).

“I’m comfortable in my own skin, and my six-inch heels,” she told the Free Press in 2011.

Though Franklin still performed regularly in the ’90s and ’00s, her touring work was hampered by her fear of flying, which had set in after a frightening small plane trip in the early ‘80s. She insisted on bus travel, trekking across the U.S. to play for adoring crowds at theaters and summer amphitheaters.

“I’ve definitely evolved to a greater maturity onstage, a savoir faire, I think,” she told the Free Press. “It’s just about relaxing more, really, and having fun with it. That comes with time, to evolve to that level and find that it’s really very simple … that it’s really about having fun and communicating with your audience.”

Franklin was long dogged by weight issues and struggled with alcohol abuse in the late 1960s. But the first glaring sign of health problems came in 2010, when she canceled six months of concert commitments while hospitalized for undisclosed reasons.

She reemerged the next summer visibly slimmer and seemingly healthy, returning with a glowing show at the Chicago Theatre: “Six months after the world was braced for the worst, Aretha Franklin gave it her best,” as the Free Press reported at the time.

“Her voice was velvety and potent as she rolled into her set, still finding new curves and corners in the notes of songs such as ‘Think,’ ‘Sparkle’ and ‘Baby I Love You,’ ” read the review.

Nevertheless, Franklin’s concert activity became hit-and-miss during her final years, and show cancellations became par for the course, often chalked up to unnamed health problems. She increasingly spoke of winding things down, performing fewer shows by the year, and in February 2017 finally raised the prospect of retirement, saying she was recording a final album.

Two missions loomed large during the final decade of Franklin’s life, and both were still in the works when she died: She was in ongoing talks to produce a biographical film about her life, frequently talking up potential lead actresses such as Jennifer Hudson, Halle Berry and Audra McDonald. And she was enchanted by the idea of opening a soul food restaurant in downtown Detroit.

Reclusive by nature, Franklin liked being at home and enjoying “the small things,” as she said in 2011 — polishing the silver, buying a tea set, washing and ironing. She was a reader drawn to biographies and an avid media consumer who looked forward to her daily newspapers.

“I enjoy the comfort of home very much,” she said. “I’m very domestic when I’m at home. I can stay in the house for the longest kind of time and not get out.”

From Obama to Pavarotti, always grand

It was always BIGwith Aretha Franklin. The public situations skewed to the larger-than-life, the supersized, the majestic. She was an immense presence, physically and psychologically, and could take over rooms simply by sweeping into them.

She had a knack for finding herself at the center of grand moments, whether stealing the show at the Obama inaugural or filling in for the ailing Luciano Pavarotti with an impromptu “Nessun Dorma” at the 1998 Grammys.

“She could get a U.S. president on the phone with two calls,” said Brian Pastoria, who co-engineered some of Franklin’s studio work.

Indeed, it was the little stuff that seemed to vex Franklin most. She struggled with personal finances, and was frequently forced into small-claims court by mom-and-pop operations around metro Detroit — limo services, caterers, contractors. Her home was often cluttered and unkempt, and while experts on creative genius might say that comes with the territory, it was enough to frustrate neighbors and leave visitors puzzled why she had so little help around her.

For years Franklin talked about plans to tackle her flying phobia, but never followed through. It kept her grounded for the final 35 years of her life, plausibly costing her millions in touring revenue.

Franklin was scrupulously private. Even in Detroit music circles, the ’Ree ’Ree rumor mill churned slowly; her personal life was shielded by a tight cadre of family members and friends. When writer Mark Bego set out to pen the first authorized Aretha Franklin biography, 1989’s “The Queen of Soul,” he was struck by the array of unknowns that still surrounded her — basic details about her two marriages and divorces, her upbringing, even her musical inspirations.

“I felt as if I had just encountered one of the great unsolved mysteries of the show-business world,” he wrote.

Franklin cautiously traipsed into some of those topics with her 1999 autobiography, “Aretha: From These Roots.” But she remained elusive enough that her handpicked co-author, David Ritz, was compelled to write his own uninhibited Franklin biography 15 years later.

That book provoked the singer’s wrath — the sort of eruption familiar to those in Aretha’s world. Franklin continually churned through support staff, hiring and firing lawyers, publicists and producers. She feuded with other female singers and knew how to hold a grudge, including a beef with Dionne Warwick that became public only when Franklin alerted the press out of the blue — five years after it happened.

But when it came to the music, few were more disciplined than Franklin. She was serious about her voice and exacting about her concert conditions: big on honey and hot tea before a show and insistent on rooms without air conditioning, aware it could dry out her throat.

Many who worked closely with her also glimpsed the humanity at the heart of the superstar singer who came up in the church.

“She (was) very compassionate,” the late Darryl Houston said in 2010. Houston was Franklin’s accompanying pianist for more than two decades. “When I was dealing with the sickness and eventual death of my father in Mississippi, she was very encouraging in thought and deed. I remember a few times I would get a call from a travel agent saying: ‘When do you want to go see your dad? Ms. Franklin has taken care of the ticket.’ “

Brian Pastoria was part of a studio team that worked with Franklin in the 1990s and 2000s, including recording sessions at her home.

“Before the vocal sessions, she’d be in the kitchen making chili. After recording a couple of hours, she’d say, ‘OK, time to eat!’ ” Pastoria recalled. “Even though she was the greatest of all time, the Muhammad Ali of vocals, it was still always her calling on the phone for business, not her lawyer. You’d hear, ‘Hi, honey, how are you!’ It was nice. It was real. You never felt like you were dealing with a major superstar.”

For all the public gowns, glitz and diva references — she was famously portrayed in a Snickers commercial as a crabby prima donna — Franklin was a homegirl at heart. She was a connoisseur of old school Southern soul food, proud of her knack with homemade dishes like fried chicken and ham with black-eyed peas.

“I think I rank with the best when it comes to the stove,” she told the Free Press in 1996.

That sort of organic realness coursed through her work.

“She paints a picture with a song,” said Houston. “Outside of being vocally astute, you can feel what she’s singing. You can tell when someone is just singing a song, and when the song is a part of their inner being. With Aretha, what leaves the heart reaches the heart.”

“It seems she never, ever forgot those roots of the church, and she really believed that we need to look above the things of this world, to a more spiritual level,” said social activist Rocky Twyman. “You felt like she wanted to bless humanity with her music.”

Franklin was a frequent visitor at New Bethel well into her final years, hosting gospel concerts and holiday celebrations at the church whose original site hosted the recording of her first album.

“I’ve known many of the most dynamic singers on the planet,” said Detroit poet and musician Jessica Care Moore. “There’s still no voice like Aretha Franklin. She embodied the idea of what soul music was and would become. She opens her mouth and everything stands still.”

As a young woman growing up in the city, Moore said, it was easy to be inspired by Franklin — an “honor and blessing” to be in the presence of a Detroit great.

“She absolutely is the sound of Detroit,” said Moore. “She lifted up the city and represented it in a global way.”

In November, Franklin sang in public for the last time, performing a nine-song set at an Elton John AIDS Foundation benefit in New York.

Franklin had made her final hometown appearance on June 10, 2017, headlining the Detroit Music Weekend festival for thousands gathered in the streets. Down the block two days earlier, tears had streamed down her face as she was honored by the city with the unveiling of Aretha Franklin Way, a ceremonial renaming of Madison Street.

On the festival stage that weekend, Franklin was backed by a setting sun and the nearby marquee of the Fox Theatre, her favorite local venue since she was a young girl. For nearly two hours, she performed a spirited, feisty set while clearly struggling through pain, at one point singing from a plush chair.

Franklin did it her way that night, foregoing many of her biggest hits for a deeper dive into her catalog and a stirring, 11-minute gospel workout of “Precious Memories.”

The old soaring power may have been missing, but the passion was intact. For one last time on a Detroit stage, there was Aretha Franklin, and there was that voice.

That voice — still captivating, but now comforting in its decades-long familiarity. A sound still melding urban vitality with the warmth of Southern soul. Still joy, pain, ecstasy, liberation. Still strength and femininity. And still offering, as it always will, the promise of transcendence.

https://www.freep.com/story/entertainment/music/2018/08/16/aretha-franklin-dies/309137002/

How Aretha Franklin made ‘Respect’ a feminist anthem

Fiachra GIBBONS, Anthony LUCAS

,

AFP

It may be the most rousing feminist anthem ever, but “Respect” — the song that made Aretha Franklin the “Queen of Soul” — was actually written about a man demanding a break from his wife.

Franklin’s genius was to turn the song — and the traditional values it espoused — on their head by some deft changes to the lyrics and by adding the stirring “R – E – S – P – E – C – T” chorus.

In so doing, she made Otis Redding’s 1965 lament of an exhausted working man demanding some slack from his woman into a rallying call for downtrodden African American women.

Rolling Stone magazine put her version in the top five greatest songs of all time, saying Franklin was a “woman calling an end to the exhaustion and sacrifice of a raw deal with scorching sexual authority.”

And even Redding — who wrote other such timeless classics like “Dock of the Bay” and “Try a Little Tenderness” — acknowledged within months of Franklin’s recording that the song belonged to her.

His biographer Mark Ribowsky said that at the 1967 Monterey Pop Festival in California, Redding joked to the crowd, saying: “This next song is a song that a girl took away from me.”

Five months later, the “King of Soul” died in a plane crash aged just 26.

Franklin was an almost unknown gospel singer from Detroit when she went into the studio to record “Respect” with her sisters Erma and Carolyn.

She speeded the song up and cooked up the provocative high-tempo “Sock it to me” refrain, producer Jerry Wexler later recalled in his autobiography, “Rhythm and the Blues: A Life in American Music.”

“The fervour in Aretha’s voice demanded that respect,” he wrote.

But American musicologist Professor Victoria Malawey told AFP that Franklin’s take on the song was far more than a jazzed up cover version.

– A new soul –

She insisted that Franklin changed “the song so radically… that I would argue she re-authored it.

“It was not just her altering of the lyrics, or changing the point of view of the song from a male one to that of a woman, she also gave it an entirely new energy and soul,” the pop music specialist added.

Malawey, chair of music at Macalester College in Minneapolis-Saint Paul, credits Franklin with turning the song into an anthem for both the feminist and civil rights movement in the late 1960s.

“Not only did she add the R-E-S-P-E-C-T chorus, but her remaking of the song gives it a whole different empowerment message, both sexually and politically.

“In my opinion, the extent of her re-authoring grants her status as owner of the song, and makes it a whole new sonic experience. That is why multiple social movements have claimed Franklin’s ‘Respect’ as theirs” over the past half-century, she said.

The hit won Franklin the first two of her 18 Grammy awards, and went on to feature in more than 30 major films including “Platoon”, “The Blues Brothers”, “Mystic Pizza” and “Forrest Gump”.

Malawey said that Franklin, the daughter of a Baptist minister, always denied that there were sexual overtones to the lyrics she added.

– Sexual empowerment –

But Wexler begged to differ. “More respect also involved sexual attention of the highest order. What else would ‘Sock it to me’ mean?” he said.

Others who knew her said she was drawing from her tumultuous marriage at the time.

“Whatever the intention, people have taken a definite female sexual empowerment message from the song,” Malawey said.

“There is a long tradition of black female performers allowing for a variety of meanings from their lyrics to assert their sexuality. You see this right down to Beyonce.”

But Malawey said it was Franklin’s “voice, and the power and soul she gives the song, which has inspired and empowered so many people.

“It is something beyond lyrics or the melody that really moves us and that is all to do with Aretha Franklin’s own vocal delivery. That is what has made the song so powerful, so lasting and so relevant today.”

https://www.yahoo.com/news/aretha-franklin-made-respect-feminist-anthem-143229602.html%5D

 

Aretha Franklin

From Wikipedia, the free encyclopedia

Jump to navigationJump to search

Aretha Franklin
Aretha Franklin 1968.jpg

Franklin in 1968
Born Aretha Louise Franklin
March 25, 1942
Memphis, Tennessee, U.S.
Died August 16, 2018 (aged 76)
Detroit, Michigan, U.S.
Occupation
  • Singer
  • songwriter
  • pianist
Years active 1956–2017
Home town Detroit, Michigan, U.S.
Spouse(s)
Ted White
(m. 1961; div. 1969)
Glynn Turman
(m. 1978; div. 1984)
Children 4
Parent(s) Clarence LaVaughn Franklin
Barbara Siggers Franklin
Relatives Erma Franklin (sister)
Carolyn Franklin (sister)
Awards Aretha Franklin awards
Musical career
Genres
Instruments
  • Vocals
  • piano
Labels
Associated acts
Website arethafranklin.net

Aretha Louise Franklin (March 25, 1942 – August 16, 2018) was an American singer, songwriter and pianist.[1] She began her career as a child singing gospel at New Bethel Baptist Church in Detroit, where her father, C. L. Franklin, was minister. In 1960, at the age of 18, she embarked on a secular career, recording for Columbia Records but achieving only modest success. After signing to Atlantic Records in 1967, Franklin achieved commercial acclaim and success with songs such as “Respect“, “(You Make Me Feel Like) A Natural Woman“, “Spanish Harlem” and “Think“.

By the end of the 1960s she was being called “the Queen of Soul“. Franklin recorded acclaimed albums such as I Never Loved a Man the Way I Love You (1967), Lady Soul (1968), Young, Gifted and Black (1972) and Amazing Grace (1972) before experiencing problems with her record company by the mid-1970s. After her father was shot in 1979, Franklin left Atlantic and signed with Arista Records, finding success with the albums Jump to It (1982) and Who’s Zoomin’ Who? (1985), and her part in the 1980 film The Blues Brothers.

In 1998, Franklin received international acclaim for singing the opera aria “Nessun dorma” at the Grammy Awards that year, replacing Luciano Pavarotti. Later that year, she scored her final Top 40 song with “A Rose Is Still a Rose“.

Franklin recorded 112 charted singles on Billboard, including 77 Hot 100 entries, 17 top ten pop singles, 100 R&B entries and 20 number-one R&B singles, becoming the most charted female artist in the chart’s history. Franklin’s other well-known hits include “Rock Steady“, “Jump to It“, “Freeway of Love“, “Who’s Zoomin’ Who“, “Chain of Fools“, “Until You Come Back to Me (That’s What I’m Gonna Do)“, “Something He Can Feel“, “I Knew You Were Waiting (For Me)” (with George Michael), and a remake of The Rolling Stones song “Jumpin’ Jack Flash“.

She won 18 Grammy Awards, including the first eight awards given for Best Female R&B Vocal Performance from 1968 through 1975, and is one of the best-selling musical artists of all time, having sold over 75 million records worldwide.[2]

Franklin received numerous honors throughout her career including a 1987 induction into the Rock and Roll Hall of Fame, in which she became the first female performer to be inducted. She was inducted to the UK Music Hall of Fame in 2005. In August 2012, Franklin was inducted into the GMA Gospel Music Hall of Fame.[3] Franklin is listed in at least two all-time lists on Rolling Stone magazine, including the 100 Greatest Artists of All Time, and the 100 Greatest Singers of All Time.[4]

Early life

Franklin’s birthplace, 406 Lucy Avenue, Memphis, Tennessee.[5]

Aretha Louise Franklin was born at 406 Lucy Avenue, Memphis, Tennessee, to Barbara (née Siggers) and Clarence LaVaughn “C. L.” Franklin. Her father was an itinerant preacher originally from Shelby, Mississippi, while her mother was an accomplished piano player and vocalist.[6] Her parents had three other children, and both C. L. and Barbara had children from outside their marriage. The family relocated to Buffalo, New York, when Aretha was two. Before her fifth birthday, C. L. Franklin permanently relocated the family to DetroitMichigan where he took over the pastorship of New Bethel Baptist Church. Aretha’s parents had a troubled marriage due to stories of her father’s philandering and in 1948, the couple separated, with Barbara relocating back to Buffalo with her son, Vaughn, from a previous relationship.[7]

Contrary to popular belief, her mother did not abandon her children; not only did Aretha recall seeing her mother in Buffalo during the summer, but Barbara also frequently visited her children in Detroit.[8] Aretha’s mother died on March 7, 1952, before Aretha’s tenth birthday. Several women, including Aretha’s grandmother, Rachel, and Mahalia Jackson took turns helping with the children at the Franklin home.[9]During this time, Aretha learned how to play piano by ear.[10] Aretha’s father’s emotionally driven sermons resulted in his being known as the man with the “million-dollar voice” and earning thousands of dollars for sermons in various churches across the country.[11][12] His celebrity status led to his home being visited by various celebrities, among them gospel musicians Clara WardJames Cleveland and early Caravans members Albertina Walker and Inez Andrews as well as Martin Luther King Jr.Jackie Wilson and Sam Cooke.[13][14] Aretha attended Northern High School[15] but later dropped out during her sophomore year.[16][17]

Music career

Beginnings (1952–1960)

Just after her mother’s death, Franklin began singing solos at New Bethel, debuting with the hymn, “Jesus, Be a Fence Around Me.”[9][18] Four years later, when Franklin was 14, her father began managing her, bringing her on the road with him during his so-called “gospel caravan” tours for her to perform in various churches.[19] He helped his daughter sign her first recording deal with J.V.B. Records, where her first album, Songs of Faith, was issued in 1956. Franklin sometimes traveled with The Soul Stirrers during this time.[20] At the age of 16, Franklin went on tour with Dr. Martin Luther King, Jr. and in 1968 sang at his funeral.[21]

After turning 18, Franklin confided to her father that she aspired to follow Sam Cooke in recording pop music, and moved to New York.[14] Serving as her manager, C. L. agreed to the move and helped to produce a two-song demo that soon was brought to the attention of Columbia Records, who agreed to sign her in 1960. Franklin was signed as a “five-percent artist”.[22] During this period, Franklin would be coached by choreographer Cholly Atkins to prepare for her pop performances. Before signing with Columbia, Sam Cooke tried to persuade Franklin’s father to have his label, RCA, sign Franklin. He had also been courted by local record label owner Berry Gordy to sign Franklin and her elder sister Erma to his Tamla label. Franklin’s father felt the label was not established enough yet. Franklin’s first Columbia single, “Today I Sing the Blues“,[23] was issued in September 1960 and later reached the top ten of the Hot Rhythm & Blues Sellers chart.[24]

Initial success (1961–1966)

In January 1961, Columbia issued Franklin’s first secular album, Aretha: With The Ray Bryant Combo. The album featured her first single to chart the Billboard Hot 100, “Won’t Be Long“, which also peaked at number 7 on the R&B chart. Mostly produced by Clyde Otis, Franklin’s Columbia recordings saw her recording in diverse genres such as standardsvocal jazzbluesdoo-wop and rhythm and blues. Before the year was out, Franklin scored her first top 40 single with her rendition of the standard, “Rock-a-Bye Your Baby with a Dixie Melody“, which also included the R&B hit, “Operation Heartbreak“, on its b-side. “Rock-a-Bye” became her first international hit, reaching the top 40 in Australia and Canada. By the end of 1961, Franklin was named as a “new-star female vocalist” in DownBeatmagazine.[25] In 1962, Columbia issued two more albums, The Electrifying Aretha Franklin and The Tender, the Moving, the Swinging Aretha Franklin,[26][27] the latter of which reached No. 69 on the Billboard chart.[28]

By 1964, Franklin began recording more pop music, reaching the top ten on the R&B chart with the ballad, “Runnin’ Out of Fools” in early 1965. She had two R&B charted singles in 1965 and 1966 with the songs “One Step Ahead” and “Cry Like a Baby” while also reaching the Easy Listening charts with the ballads “You Made Me Love You” and “(No, No) I’m Losing You”. By the mid-1960s, Franklin was netting $100,000 from countless performances in nightclubs and theaters.[29] Also during that period, Franklin appeared on rock and roll shows such as Hollywood A Go-Go and Shindig!. However, Franklin struggled with commercial success while at Columbia. Label executive John H. Hammond later said he felt Columbia did not understand Franklin’s early gospel background and failed to bring that aspect out further during her period there.[23]

Commercial success (1967–1979)

Aretha Franklin in 1967

In November 1966, after 6 years with Columbia, Franklin chose not to renew her contract with the company and signed to Atlantic Records.[30] In January 1967, she traveled to Muscle Shoals, Alabama to record at FAME Studios and recorded the song, “I Never Loved a Man (The Way I Love You)” in front of the musicians of the famed Muscle Shoals Rhythm Section.[23] The song was later issued that February and reached number one on the R&B chart, while also peaking at number nine on the Billboard Hot 100, giving Franklin her first top ten pop single. The song’s b-side, “Do Right Woman, Do Right Man“, reached the R&B top 40, peaking at number 37. In April, Atlantic issued her frenetic version of Otis Redding‘s “Respect“, which shot to number one on both the R&B and pop charts. “Respect” became her signature song and was later hailed as a civil rights and feminist anthem.[23]

Franklin’s debut Atlantic album, I Never Loved a Man the Way I Love You, also became commercially successful, later going gold. Franklin scored two more top ten singles in 1967 including “Baby I Love You” and “(You Make Me Feel Like) A Natural Woman“. Franklin’s rapport with producer Jerry Wexler helped in the creation of the majority of Franklin’s peak recordings with Atlantic. In 1968, she issued the top-selling albums, Lady Soul and Aretha Now, which included some of Franklin’s most popular hit singles, including “Chain of Fools“, “Ain’t No Way“, “Think” and “I Say a Little Prayer“. In February 1968, Franklin earned the first two of her Grammys, including the debut category for Best Female R&B Vocal Performance.[31] On February 16, 1968, Franklin was honored with a day in her honor and was greeted by longtime friend Martin Luther King Jr. who gave her the SCLC Drum Beat Award for Musicians just two months before his death.[32][33][34] In June 1968, she appeared on the cover of Time magazine.[35]

Franklin’s success expanded during the early 1970s in which she recorded top ten singles such as “Spanish Harlem“, “Rock Steady” and “Day Dreaming” as well as the acclaimed albums Spirit in the DarkYoung, Gifted and Black, and her gospel album, Amazing Grace, which sold over two million copies. In 1971, Franklin became the first R&B performer to headline Fillmore West, later releasing the live album Aretha Live at Fillmore West.[36] Franklin’s career began to experience problems while recording the album, Hey Now Hey, which featured production from Quincy Jones. Despite the success of the single “Angel“, the album bombed upon its release in 1973. Franklin continued having R&B success with songs such as “Until You Come Back to Me” and “I’m in Love“, but by 1975 her albums and songs were no longer top sellers. After Jerry Wexler left Atlantic for Warner Bros. Records in 1976, Franklin worked on the soundtrack to the film Sparkle with Curtis Mayfield. The album yielded Franklin’s final top 40 hit of the decade, “Something He Can Feel“, which also peaked at number one on the R&B chart. Franklin’s follow-up albums for Atlantic, including Sweet PassionAlmighty Fire and La Diva, bombed on the charts, and in 1979 Franklin opted to leave the company.[37]

Later years (1980–2018)

Franklin performing on April 21, 2007, at the Nokia Theater in Dallas, Texas

In 1980, after leaving Atlantic Records,[38] Franklin signed with Clive Davis‘ Arista Records and that same year gave a command performance at the Royal Albert Hall in front of Queen Elizabeth. Franklin also made an acclaimed guest role as a waitress in the comedy musical, The Blues Brothers. Franklin’s first Arista album, Aretha, featured the No. 3 R&B hit, “United Together” and her Grammy-nominated cover of Otis Redding‘s “I Can’t Turn You Loose“. The follow-up, 1981’s Love All the Hurt Away, included her famed duet of the title track with George Benson while the album also included her Grammy-winning cover of Sam & Dave‘s “Hold On, I’m Comin’“. Franklin achieved a gold record—for the first time in seven years—with the album Jump to It. Its title track was her first top 40 single on the pop charts in six years.[39]

In 1985, inspired by a desire to have a “younger sound” in her music, Who’s Zoomin’ Who? became her first Arista album to be certified platinum. The album sold well over a million copies thanks to the hits, “Freeway of Love“, the title track, and “Another Night”.[40] The following year’s Aretha album nearly matched this success with the hit singles “Jumpin’ Jack Flash“, “Jimmy Lee” and “I Knew You Were Waiting for Me“, her international number-one duet with George Michael. During that period, Franklin provided vocals to the theme songs of the TV shows A Different World and Together.[41] In 1987, she issued her third gospel album, One Lord, One Faith, One Baptism, which was recorded at her late father’s New Bethel church, followed by Through the Storm in 1989. Franklin’s 1991 album, What You See is What You Sweat, flopped on the charts. Franklin returned to the charts in 1993 with the dance song “A Deeper Love” and returned to the top 40 with the song “Willing to Forgive” in 1994.[42]

In 1998, Franklin returned to the top 40 with the Lauryn Hill-produced song “A Rose Is Still a Rose“, later issuing the album of the same name, which went gold. That same year, Franklin earned international acclaim for her performance of “Nessun Dorma” at the Grammy Awards.[43] Her final Arista album, So Damn Happy, was released in 2003 and featured the Grammy-winning song, “Wonderful”. In 2004, Franklin announced that she was leaving Arista after over 20 years with the label.[44] To complete her Arista obligations, Franklin issued the duets compilation album, Jewels in the Crown: All-Star Duets with the Queen, in 2007.[45] The following year, she issued the holiday album, This Christmas, Aretha, on DMI Records.[46]

Franklin singing at the 2009 inauguration of President Obama

Franklin performed The Star-Spangled Banner with Aaron Neville and Dr. John for Super Bowl XL, held in her hometown of Detroit in February 2006. She later made international headlines for performing “My Country, ‘Tis of Thee” at President Barack Obama‘s inaugural ceremony with her church hat becoming a popular topic online. In 2010, Franklin accepted an honorary degree from Yale University.[47] In 2011, under her own label, Aretha’s Records, she issued the album, Aretha: A Woman Falling Out of Love.

In 2014, Franklin was signed under RCA Records, controller of the Arista catalog and a sister label to Columbia via Sony Music Entertainment, and was working with Clive Davis. An album was planned with producers Babyface and Danger Mouse.[48] On September 29, 2014, Franklin performed to a standing ovation, with Cissy Houston as backup, a compilation of Adele‘s “Rolling in the Deep” and “Ain’t No Mountain High Enough” on the Late Show with David Letterman.[49] Franklin’s cover of “Rolling in the Deep” was featured among nine other songs in her first RCA release, Aretha Franklin Sings the Great Diva Classics, released in October 2014.[50] In doing so, she became the first woman to have 100 songs on Billboard’s Hot R&B/Hip-Hop Songs chart with the success of her cover of Adele‘s “Rolling in the Deep“, which debuted at number 47 on the chart.[51]

Franklin, waiting to perform at the White House in 2015

In December 2015, Franklin gave an acclaimed performance of “(You Make Me Feel Like) A Natural Woman” at the 2015 Kennedy Center Honors during the section for honoree Carole King, who co-wrote the song.[52][53][54][55] During the bridge of the song, Ms. Franklin dropped her fur coat to the stage, for which the audience rewarded her with a mid-performance standing ovation.[56] She returned to Detroit’s Ford Field on Thanksgiving Day 2016 to once again perform the national anthem before the game between the Minnesota Vikings and Detroit Lions. Seated behind the piano in a black fur coat and Lions stocking cap, this rendition of “The Star-Spangled Banner” lasted over four minutes and featured a host of improvisations by Franklin.[57]

Franklin released the album A Brand New Me in November 2017 with the Royal Philharmonic Orchestra, which uses archived recordings from her past. It peaked at number 5 on the Billboard Top Classical Albums chart.[58]

Music style and image

According to Richie Unterberger, Franklin was “one of the giants of soul music, and indeed of American pop as a whole. More than any other performer, she epitomized soul at its most gospel-charged.”[59] She had often been described as a great singer and musician due to “vocal flexibility, interpretive intelligence, skillful piano-playing, her ear, her experience”.[60] Franklin’s voice was described as being a “powerful mezzo-soprano voice”. She was praised for her arrangements and interpretations of other artists’ hit songs.[61] Of describing Franklin’s voice as a youngster on her first album, Songs of Faith, released when she was just fourteen, Jerry Wexler explained that Franklin’s voice “was not that of a child but rather of an ecstatic hierophant“.[62]

Personal life

Aretha Franklin and William Wilkerson watching Roger Federer at the 2011 US Open.

After being raised in Detroit, Franklin relocated to New York City in the 1960s, where she lived until moving to Los Angeles in the mid-1970s. She eventually settled in Encino, Los Angeles where she lived until 1982. She then returned to the Detroit suburb of Bloomfield Hills, Michigan to be close to her ailing father and siblings. Franklin maintained a residence there until her death. Following an incident in 1984, she had cited a fear of flying that prevented her from traveling overseas; she performed only in North America afterwards.[63]

Franklin was the mother of four sons. She first became pregnant at the age of 12 and gave birth to her first child, named Clarence after her father, on January 28, 1955. According to the news site Inquisitr, “The father of the child was Donald Burk, a boy she knew from school.”[64] On January 22, 1957, then aged 14, Franklin had a second child, named Edward after his father Edward Jordan.[16]

Both of her children took her family name. While Franklin was pursuing her career and “hanging out with [friends]”, Franklin’s grandmother Rachel and sister Erma took turns raising the children.[65] Franklin’s third child, Ted White Jr., was born in February 1964[66] and is known professionally as Teddy Richards. He has provided guitar backing for his mother’s band during live concerts.[67] Her youngest son, Kecalf Cunningham was born in 1970 and is the child of her road manager Ken Cunningham.[68]

Franklin was married twice. Her first husband was Theodore “Ted” White, whom she married in 1961 at age 19.[69][70] After a contentious marriage that involved domestic violence, Franklin separated from White in 1968, divorcing him in 1969.[71] Franklin then married her second husband, actor Glynn Turman, on April 11, 1978 at her father’s church. By marrying Turman, Franklin became stepmother of Turman’s three children from a previous marriage. Franklin and Turman separated in 1982 after Franklin returned to Michigan from California, and they divorced in 1984. At one point, Franklin had plans to marry her longtime companion Willie Wilkerson.[72] Franklin and Wilkerson had had two previous engagements stretching back to 1988. Franklin eventually called the 2012 engagement off.[73]

Franklin’s sisters, Erma and Carolyn, were professional musicians as well and spent years performing background vocals on Franklin’s recordings. Following Franklin’s divorce from Ted White, her brother Cecil became her manager, and maintained that position until his death from lung cancer on December 26, 1989. Sister Carolyn died the previous year in April 1988 from breast cancer, while eldest sister Erma died from throat cancer in September 2002. Franklin’s half-brother Vaughn died two months after Erma in late 2002.[74]

Her half-sister, Carl Kelley (née Jennings; born 1940) is C. L. Franklin’s daughter by Mildred Jennings, a then 12-year-old congregant of New Salem Baptist Church in Memphis, where C. L. was pastor.[74]

Franklin was performing at the Aladdin Hotel in Las Vegas, on June 10, 1979, when her father, C. L., was shot twice at point blank range in his Detroit home.[75] After six months at Henry Ford Hospital, still in a state of coma, C.L. was moved back to his home with 24-hour nursing care. Aretha moved back to Detroit in late 1982 to assist with the care of her father, who died at Detroit’s New Light Nursing Home on July 27, 1984.[76]

Some of her music business friends have included Dionne WarwickMavis Staples, and Cissy Houston, who began singing with Franklin as members of the Sweet Inspirations. Cissy sang background on Franklin’s hit “Ain’t No Way”.[77] Franklin first met Cissy’s daughter, Whitney, in the early 1970s. She was made Whitney’s honorary aunt, not a godmother as has been occasionally misreported, and Whitney often referred to her as “Auntie Ree”.[78]

Whitney Houston died on February 11, 2012.[79] Franklin said she was surprised by her death.[79] She had initially planned to perform at Houston’s memorial service on February 18, but her representative claimed that Franklin suffered a leg spasm and was unable to attend. In response to criticism of her non-attendance, she stated, “God knows I wanted to be there, but I couldn’t.”[80]

Franklin was a registered Democrat.[81] In 2014, she was granted the honorary degree of Doctor of Arts from Harvard University for her contributions to music.[82]

Health problems

Franklin dealt with weight issues for years. In 1974, she dropped 40 pounds (18 kg) during a crash diet[83] and maintained her new weight until the end of the decade.[84] Franklin again lost the weight in the early 1990s before gaining some back.[85] A former chain smoker who struggled with alcoholism, she quit smoking in 1992.[86] Franklin admitted in 1994 that her smoking was “messing with my voice”,[87] but after quitting smoking she said later, in 2003, that her weight “ballooned”.[88]

In 2010, Franklin canceled a number of concerts after she decided to have surgery for an undisclosed tumor.[85] Discussing the surgery in 2011, she quoted her doctor as saying it would “add 15 to 20 years” to her life. She denied that the ailment had anything to do with pancreatic cancer, as it was rumored.[89] On May 19, 2011, Franklin had her comeback show in the Chicago theatre.[90] In May 2013, Franklin canceled two performances to deal with an undisclosed medical treatment.[91] Later in the same month, Franklin canceled three more concerts in June and planned to return to perform in July.[92] A show scheduled for July 27 in Clarkston, Michigan was canceled due to continued medical treatment.[93] In addition, she canceled an appearance at a Major League Baseball luncheon in Chicago honoring her commitment to civil rights on August 24.[94] She also canceled a performance of September 21 in Atlanta due to her health recovery.[95]

During a phone interview with Associated Press in late August 2013, Franklin stated that she had a “miraculous” recovery from her undisclosed illness but had to cancel shows and appearances until she was at 100% health, estimating she was about “85% healed”.[96]

Franklin later returned to live performing, including a 2013 Christmas concert at Detroit’s MotorCity Casino Hotel. She launched a multi-city tour beginning in mid-2014, starting with a performance of June 14 in New York at the Radio City Music Hall.[97]

In 2017, Franklin canceled a series of concerts due to health reasons. During an outdoors Detroit show, Franklin told the audience to “keep me in your prayers”.[98] In July 2017, Franklin reemerged, appearing to lose more weight before a performance at the Wolf Trap in Virginia.[99] In 2018, Franklin also canceled a series of shows citing doctor’s orders. Franklin’s final performance was at the Cathedral of Saint John the Divine in New York City during Elton John‘s 25th anniversary gala for the Elton John AIDS Foundation on November 7, 2017.[100]

Final illness and death

On August 13, 2018, Franklin was reported to be gravely ill at her home in Riverfront TowersDetroit.[101] She was reported to be under hospice care and surrounded by friends and family. Stevie WonderJesse Jackson, and ex-husband Glynn Turman, among others, had visited her at her home a few days before her death.[102] Franklin died at home on August 16, 2018, aged 76.[103] The cause was reported to be advanced pancreatic cancer.[104][105]

Legacy

Franklin wipes a tear after being given the Presidential Medal of Freedom on November 9, 2005, at the White House. She is seated between fellow recipients Robert Conquest (left) and Alan Greenspan.

Franklin received a star on the Hollywood Walk of Fame in 1979, had her voice declared a Michigan “natural resource” in 1985,[106] and became the first woman inducted into the Rock and Roll Hall of Fame in 1987.[107]

The National Academy of Recording Arts and Sciences awarded her a Grammy Legend Award in 1991, then the Grammy Lifetime Achievement Award in 1994. Franklin was a Kennedy Center Honoree in 1994, recipient of the National Medal of Arts in 1999, and was bestowed the Presidential Medal of Freedom in 2005.[14] She was inducted into the Michigan Rock and Roll Legends Hall of Fame in 2005.[108]

Franklin became the second woman inducted to the UK Music Hall of Fame in 2005. She was the 2008 MusiCares Person of the Year, performing at the Grammys days later. Following news of Franklin’s surgery and recovery in February 2011, the Grammys ceremony paid tribute to the singer with a medley of her classics performed by Christina AguileraFlorence WelchJennifer HudsonMartina McBride, and Yolanda Adams.[109] That same year she was ranked 19th among the Billboard Hot 100 All-Time top artists,[110] and ranked first on the Rolling Stone list of Greatest Singers of All Time.[111] Later in 2013, she was again ranked first in Rolling Stone magazine’s “100 Greatest Singers” list.[112]

Inducted to the GMA Gospel Music Hall of Fame in 2012, Franklin was described as “the voice of the civil rights movement, the voice of black America” and a “symbol of black equality”.[113][114] Asteroid 249516 Aretha was named in her honor in 2014.[115]

“American history wells up when Aretha sings”, president Obama explained in response to her performance of “A Natural Woman” at the 2015 Kennedy Center Honors. “Nobody embodies more fully the connection between the African-American spiritual, the blues, R&B, rock and roll—the way that hardship and sorrow were transformed into something full of beauty and vitality and hope”.[116] On June 8, 2017, the City of Detroit honored Franklin’s legacy by renaming a portion of Madison Street, between Brush and Witherell Streets, “Aretha Franklin Way”.[117]

On January 29, 2018, the Oakland Press‘s correspondent Gary Graff confirmed that the American Idol runner-up Jennifer Hudson will take the role to play Franklin in her coming biopic.[118] The news was announced by the the film’s executive producer Clive Davis, who made public their decision on the choice of actors casting in the film two days before Graff’s article was published.

An all-star tribute concert to Franklin, celebrating her music, is scheduled for November 14, 2018 at Madison Square Garden in New York City.[119]

Honorary degrees

Franklin received an honorary degree from Harvard University in 2014,[120] as well as honorary doctorates in music from Princeton University, 2012; Yale University, 2010; Brown University, 2009; Berklee College of Music, 2006; New England Conservatory of Music, 1995; and University of Michigan, 1987.[citation needed]

Franklin was awarded an honorary Doctor of Humane Letters by Wayne State University in 1990 and an honorary Doctor of Law by Bethune–Cookman University in 1975.[121]

Discography

Studio albums

List of number-one R&B singles

Filmography

See also

References …

Sources

External links

https://en.wikipedia.org/wiki/Aretha_Franklin

 

Story 2: The Press Strikes Back At President Trump’s Fake News Enemy of The People Charge — American People Do Not Trust Big Lie Media (Television News and City Newspapers) Progressive Propaganda — Videos

See the source image

See the source imageSee the source imageSee the source image

See the source image

See the source image

See the source image

 

Newspapers speak up about Trump’s repeated attacks

Newspapers across the country call out Trump for press attacks – Daily Mail

US press unite against Trump ‘fake news’ attacks

Hundreds of newspapers push back against Trump’s “fake news” attacks

350 newspapers coordinate editorials condemning Trump’s media attacks

Trump launches new broadside against media: ‘Fake, fake, disgusting news’

Trump Calls The Media “Fake Fake Disgusting Media”

President Trump: Fake news is the enemy of the people

Trump calls the media ‘horrible, horrendous people’

Leaders who’ve called the press ‘enemies of the people’

Trump’s ‘Fake News’ award winners are …

Shep Smith: Journalists are not the enemy of the people

Donald Trump Posts A Series Of Tweets Against Newspaper Editorials

 

Hundreds of US newspapers hit back at Trump, defend free press

Rob Lever

,

AFP

More than 200 US news organizations have joined a campiagn led by the Boston Globe to counter President Donald Trump’s contention that the media is the “enemy of the people”

More than 200 US news organizations have joined a campiagn led by the Boston Globe to counter President Donald Trump’s contention that the media is the “enemy of the people” (AFP Photo/Joseph PREZIOSO)

Washington (AFP) – US newspapers big and small hit back Thursday at Donald Trump’s attacks on the news media with a coordinated campaign of editorials, triggering a fresh tirade from the president on Twitter.

Leading the charge was The Boston Globe, which had called for the drive highlighting the importance of a free press, accompanied by the hashtag #EnemyOfNone.

More than 300 newspapers around the country joined the effort.

“Today in the United States we have a president who has created a mantra that members of the media who do not blatantly support the policies of the current US administration are the ‘enemy of the people,'” the Globe editorial said.

“This is one of the many lies that have been thrown out by this president, much like an old-time charlatan threw out ‘magic’ dust or water on a hopeful crowd,” it added in a piece entitled “Journalists are not the Enemy.”

The effort comes amid Trump’s persistent claims that mainstream media outlets that publish articles critical of him are churning out “fake news.”

The New York Times, a frequent target of Trump’s criticism, ran a seven-paragraph editorial under a giant headline with all capital letters that read “A FREE PRESS NEEDS YOU.”

“Insisting that truths you don’t like are ‘fake news’ is dangerous to the lifeblood of democracy. And calling journalists the ‘enemy of the people’ is dangerous, period,” the Times wrote.

Trump fired back on Twitter by repeating his contention that the “fake” news media is “the opposition party” and claiming the Boston Globe was “in collusion” against him with other media.

“There is nothing that I would want more for our Country than true FREEDOM OF THE PRESS,” he tweeted.

“The fact is that the Press is FREE to write and say anything it wants, but much of what it says is FAKE NEWS, pushing a political agenda or just plain trying to hurt people.”

The US Senate meanwhile countered the White House by unanimously passing a resolution citing the “indispensable role of the free press” and warning that efforts to undermine the media were “an attack on our democratic institutions.”

Other newspapers joining the campaign said Trump’s attacks diminish the importance of journalists in their communities.

“For more than two centuries.. the press has served as a check on power, informing the American people about corruption and greed, triumphs and tragedies, grave mistakes and misdeeds and even ineptitude and dysfunction,” wrote the Albuquerque Journal in New Mexico.

Iowa’s Des Moines Register said, “The true enemies of the people — and democracy — are those who try to suffocate truth by vilifying and demonizing the messenger.”

– Cannot sit back –

Free press advocates argue that Trump’s attacks imperil the constitutional First Amendment guarantee of freedom of the press.

“I don’t think the press can just sit back and take it, they need to make their case when the most powerful man in the world tries to undercut the First Amendment,” said Ken Paulson, a former editor-in-chief of USA Today who is dean of communications at Middle Tennessee State University.

But Paulson questioned whether editorials would be effective.

“The people who read editorials don’t need to be convinced,” he said. “They are not the ones trying to shout you down at presidential rallies.”

The campaign also faced the potential for galvanizing supporters of the president around the notion that the media is out to get him.

The San Francisco Chronicle said it would not join the effort because “it plays into Trump’s narrative that the media are aligned against him.”

But the newspaper said it would “continue to speak out against this president’s war on the free press,” doing it “in our own way, on our own timetable.”

– Stakes too high –

But media rights advocates say the stakes are too high to allow the president’s claims to go unchecked.

Some say Trump’s comments have incited threats against journalists covering his events, and may have created a climate of hostility that opened the door to violent attacks like a deadly one in June against the Capital Gazette in Annapolis, Maryland.

“Trump’s references to us as the ‘enemy of the American People’ are no less dangerous because they happen to be strategic,” the Kansas City Star wrote. “That is what Nazis called Jews. It’s how Joseph Stalin’s critics were marked for execution.”

Trump’s actions are also encouraging strongmen such as Vladimir Putin of Russia and Recep Tayyip Erdogan in Turkey to treat journalists like enemies, some newspapers said.

“The messages in today’s newspapers are best read not as a drift toward war footing, but rather as a reminder that journalism is important work,” wrote Pete Vernon in the Columbia Journalism Review.

https://www.yahoo.com/news/us-newspapers-hit-back-trump-defend-free-press-153154562.htm

Trump flames ‘the fake news media’ on morning 350 newspapers across the country accuse him of a war on press freedom

  • The president launched yet another of his attacks on the press on Twitter 
  • He called the ‘fake news’ the ‘opposition party’
  • His tweet came on a day hundreds of papers coordinated op-eds defending the press
  • ‘Journalists are not the enemy,’ wrote the Boston Globe 
  • ‘Journalists are not the enemy of the people; we’re advocating for the people,’ wrote the New York Post, Trump’s favored paper

President Donald Trump once again attacked the ‘fake news’ media on a day 350 newspapers across the country defended journalists and a free press – then tore into the newspaper that organized the public show of solidarity.

The president went after the Boston Globe, which organized papers around the country to editorialize in favor of free press, for its financial struggles and even accused it of ‘COLLUSION’ with other newspapers – a term normally associated with the Russia probe of Trump associates.

‘The Boston Globe, which was sold to the the Failing New York Times for 1.3 BILLION DOLLARS (plus 800 million dollars in losses & investment), or 2.1 BILLION DOLLARS, was then sold by the Times for 1 DOLLAR. Now the Globe is in COLLUSION with other papers on free press. PROVE IT!’ Trump wrote, singling out the paper that reached out to other newspapers across the country.

President Donald Trump once again went after the media as 'fake news' as 350 papers blasted his attacks on the press

President Donald Trump once again went after the media as ‘fake news’ as 350 papers blasted his attacks on the press

Video playing bottom right…

The president’s slams, in the form of tweets, were the latest in a series of attacks that he has volleyed online, at campaign rallies, and even at official events held at military bases as he did at Fort Drum in New York.

‘THE FAKE NEWS MEDIA IS THE OPPOSITION PARTY. It is very bad for our Great Country….BUT WE ARE WINNING!’ Trump wrote.

He responded to the criticism in yet another tweet.

‘There is nothing that I would want more for our Country than true FREEDOM OF THE PRESS. The fact is that the Press is FREE to write and say anything it wants, but much of what it says is FAKE NEWS, pushing a political agenda or just plain trying to hurt people. HONESTY WINS!’ the president wrote.

His missives came on a day more than 350 newspapers, in an effort coordinated by the Boston Globe, defended press freedoms and faulted the president for labeling the press the ‘enemy of the people’ – a term with dark connotations of an era of Soviet repression.

Trump blasted the 'FAKE NEWS MEDIA' as 350 papers defended press freedoms

Trump blasted the ‘FAKE NEWS MEDIA’ as 350 papers defended press freedoms

Trump accused the Boston Globe, which coordinated the effort, of 'COLLUSION'

Trump defended his views on Twitter Thursday amid the barrage of editorials

Trump defended his views on Twitter Thursday amid the barrage of editorials

It also came hours after he stunned the White House press by yanking the security clearance of one of his foremost online critics and a person who helped set in motion the Russia probe, former CIA chief John Brennan. Brennan blasted the move as an effort to crack down on dissent and punish political rivals.

‘Replacing a free media with a state-run media has always been a first order of business for any corrupt regime taking over a country,’ wrote the Globe in an op-ed splashed across their online site.

‘Today in the United States we have a president who has created a mantra that members of the media who do not blatantly support the policies of the current U.S. administration are the ‘enemy of the people.’ This is one of the many lies that have been thrown out by this president much like an old-time charlatan threw out ‘magic’ dust or water on a hopeful crowd,’ the paper wrote.

PUSHBACK: The Boston Globe coordinated a campaign where editorial boards around the country defended press freedom

PUSHBACK: The Boston Globe coordinated a campaign where editorial boards around the country defended press freedom

It then quoted hometown patriot John Adams who wrote: ‘The liberty of the press is essential to the security of freedom.’

Trump’s favorite paper, the Rupert Murdoch-owned New York Post, joined the effort.

‘We support a free and vibrant press, a nation where the powerful are held to account by the Fourth Estate. Journalists are not the enemy of the people; we’re advocating for the people. We stand with our colleagues,’ according to the Post editorial.

The Trump-despised New York Times also joined in. ‘Insisting that truths you don’t like are “fake news” is dangerous to the lifeblood of democracy. And calling journalists the “enemy of the people” is dangerous, period,’ the Grey Lady wrote.

Many of the rebukes came from papers in swing states Trump needs to carry to win reelection.

Wrote the Tampa Bay Times: ‘In such a toxic environment, Trump’s declarations undermine not just journalists and news organizations but the communities and democracy we endeavor to serve.’

Newspapers from Maine to Hawaii pushed back against Trump’s attacks on ‘fake news’ Thursday with a coordinated series of editorials speaking up for a free and vigorous press.

The Globe, which set the campaign in motion by urging the unified voice, had estimated that some 350 newspapers would participate.

They did across the breadth of the country. The Portland (Maine) Press-Herald said a free and independent press is the best defense against tyranny, while the Honolulu Star-Advertiser emphasized democracy’s need for a free press.

‘The true enemies of the people – and democracy – are those who try to suffocate truth by vilifying and demonizing the messenger,’ wrote the Des Moines Register in Iowa.

In St. Louis, the Post-Dispatch called journalists ‘the truest of patriots.’ The Chicago Sun-Times said it believed most Americans know that Trump is talking nonsense.

The Hartford Courant was among papers joining the effort

The Hartford Courant was among papers joining the effort

Smaller papers like the Ferndale Enterprise of California took part

Smaller papers like the Ferndale Enterprise of California took part

The San Diego Union-Tribune brought up Trump's attacks on the FBI

The San Diego Union-Tribune brought up Trump’s attacks on the FBI

'We are not the enemy,' wrote the San Jose Mercury News and East Bay Times

‘We are not the enemy,’ wrote the San Jose Mercury News and East Bay Times

The Fayetteville Observer said it hoped Trump would stop, ‘but we’re not holding our breath.’

‘Rather, we hope all the president’s supporters will recognize what he’s doing – manipulating reality to get what he wants,’ the North Carolina newspaper said.

On Thursday morning, Trump again took to Twitter to denounce ‘fake news.’ He wrote: ‘THE FAKE NEWS MEDIA IS THE OPPOSITION PARTY. It is very bad for our Great Country….BUT WE ARE WINNING!’

The Morning News of Savannah, Georgia, said it was a confidant, not an enemy, to the people.

‘Like any true friend, we don’t always tell you want you want to hear,’ the Morning News said. ‘Our news team presents the happenings and issues in this community through the lens of objectivity. And like any true friend, we refuse to mislead you. Our reporters and editors strive for fairness.’

Some newspapers used history lessons to state their case. The Elizabethtown Advocate in Pennsylvania, for instance, compared free press in the United States to such rights promised but not delivered in the former Soviet Union.

The New York Times added a pitch.

‘If you haven’t already, please subscribe to your local papers,’ said the Times, whose opinion section also summarized other editorials across the country. ‘Praise them when you think they’ve done a good job and criticize them when you think they could do better. We’re all in this together.’

The coordinated hit came amid repeated attacks by Trump on 'fake news'

The coordinated hit came amid repeated attacks by Trump on ‘fake news’

The editorial by the Press-Enterprise in southern California came with an ad for a gun show

The editorial by the Press-Enterprise in southern California came with an ad for a gun show

Magazines like the Atlantic joined in on the effortMagazines like the Atlantic joined in on the effort
Trump's favorite hometown paper, the New York Post, said journalists are 'not the enemy of hte people'

Trump’s favorite hometown paper, the New York Post, said journalists are ‘not the enemy of hte people’

That last sentiment made some journalists skittish. Some newspapers, including the Wall Street Journal and the San Francisco Chronicle, wrote editorials explaining why they weren’t joining the Globe’s effort. The Chronicle wrote that one of its most important values is independence, and going along with the crowd went against that. Both the Chronicle and Baltimore Sun said that it plays into the hands of Trump and his supporters who think the media is out to get him.

Nolan Finley, columnist and editorial page editor of The Detroit News, spoke up for the press but added a scolding. He said too many journalists are slipping opinion into their news reports, adding commentary and calling it context.

‘Donald Trump is not responsible for the eroding trust in the media,’ Finley wrote. ‘He lacks the credibility to pull that off. The damage to our standing is self-inflicted.’

The Radio Television Digital News Association, which represents more than 1,200 broadcasters and web sites, is also asking its members to point out that journalists are friends and neighbors doing important work holding government accountable.

‘I want to make sure that it is positive,’ said Dan Shelley, the group’s executive director. ‘We’re shooting ourselves in the foot if we make this about attacking the president or attacking his supporters.’

It remains unclear how much sway the effort will have. Newspaper editorial boards overwhelmingly opposed Trump’s election in 2016. Polls show Republicans have grown more negative toward the news media in recent years: Pew Research Center said 85 percent of Republicans and Republican-leaning independents said in June 2017 that the news media has a negative effect on the country, up from 68 percent in 2010.

Poll: 6 in 10 Americans think traditional news outlets report fake news

A majority of Americans believe traditional media outlets publish fake news reports, and Republicans are more likely to believe that fake news is being pushed to advance an agenda, according to a Monmouth University poll released Wednesday.

The poll, which was conducted by phone during the first week of March, found that 80 percent of respondents believed online news sources reported fake news either regularly or occasionally. Fifty-four percent of respondents, including a majority of Republicans, independents and Democrats, said that fake news reports online were published on purpose in order to advance a specific agenda,

Respondents had only slightly more trust in traditional news outlets, with 60 percent of respondents believing that traditional news outlets reported fake news either regularly or occasionally and 40 percent saying that they believed traditional news outlets reported fake news on purpose to push an agenda.

Seventeen percent of respondents said they believed fake news was reported on by traditional outlets by accident or because of poor fact-checking, and about a third of respondents said they did not believe that major outlets reported fake news.

Across the board, self-identified Republican respondents were more suspicious of the motivations behind the publication of fake news in traditional media and online. Fifty-five percent of Republican respondents believed that fake news was reported on intentionally by traditional news outlets to advance a specific agenda, compared to 41 percent of independents and 24 percent of Democrats.

A plurality of respondents said that they trusted news from ABC News, Fox News and MSNBC more than they trusted news from President Donald Trump. Republicans were far more likely to trust Trump over ABC News and MSNBC, and about 44 percent of Republican respondents said they trusted Trump and Fox News equally.

More than 80 percent of respondents said Trump had a worse relationship with the news media than previous administrations, and 58 percent said that the relationship Trump had with the news media is hurting his image. Thirty-two percent of respondents said that Trump’s relationship with the news media did not affect his image, and 7 percent said that it helped his image. Conversely, 51 percent of respondents said the news media’s image was negatively impacted by its relationship with Trump. Thirty-nine percent said the news media’s image was not affected by its relationship with Trump, and 6 percent said that its image had improved.

https://www.politico.com/story/2017/03/fake-news-monmouth-poll-media-236639

Enemy of the people

From Wikipedia, the free encyclopedia

Jump to navigationJump to search

The term enemy of the people is a designation for the political or class opponents of the subgroup in power within a larger group. The term implies that by opposing the ruling subgroup, the “enemies” in question are acting against the larger group, for example against society as a whole. It is similar to the notion of “enemy of the state“. The term originated in Roman times as Latinhostis publicus, typically translated into English as the “public enemy“. The term in its “enemy of the people” form has been used for centuries in literature (see An Enemy of the People, the play by Henrik Ibsen, 1882; or Coriolanus, the play by William Shakespeare, c. 1605). Currently this form is mostly used as a reference to Soviet phraseology.[1]

Origins of the expression

The expression dates back to Roman times.[2] The Senate declared emperor Nero a hostis publicus in AD 68.[3]

The words “ennemi du peuple” were extensively used during the French revolution. On 25 December 1793 Robespierre stated: “The revolutionary government owes to the good citizen all the protection of the nation; it owes nothing to the Enemies of the People but death”.[4] The Law of 22 Prairial in 1794 extended the remit of the Revolutionary Tribunal to punish “enemies of the people”, with some political crimes punishable by death, including “spreading false news to divide or trouble the people”.[5]

Marxist–Leninist states

Soviet Union

The Soviet Union made extensive use of the term (Russian languageвраг народа“vrag naroda”), as it fit well with the idea that the people were in control. The term was used by Vladimir Lenin after coming to power, as early as in the decree of 28 November 1917:

all leaders of the Constitutional Democratic Party, a party filled with enemies of the people, are hereby to be considered outlaws, and are to be arrested immediately and brought before the revolutionary court.[6]

Other similar terms were in use as well:

  • enemy of the labourers (враг трудящихся, vrag trudyashchikhsya)
  • enemy of the proletariat (враг пролетариата, vrag proletariata)
  • class enemy (классовый враг, klassovyi vrag), etc.

In particular, the term “enemy of the workers” was formalized in the Article 58 (RSFSR Penal Code),[7] and similar articles in the codes of the other Soviet Republics.

At various times these terms were applied, in particular, to Tsar Nicholas II and the Imperial family, aristocrats, the bourgeoisieclericsbusiness entrepreneursanarchistskulaksmonarchistsMensheviksEsersBundistsTrotskyistsBukharinists, the “old Bolsheviks“, the army and police, emigrantssaboteurswreckers (вредители, “vrediteli”), “social parasites” (тунеядцы, “tuneyadtsy”), Kavezhedists (people who administered and serviced the KVZhD (China Far East Railway), particularly the Russian population of HarbinChina), those considered bourgeois nationalists (notably RussianUkrainianBelarusianArmenianLithuanianLatvianEstonian nationalists, ZionistsBasmachi).[8]

An “enemy of the people” could be imprisoned, expelled or executed, and lose their property to confiscation. Close relatives of enemies of the people were labeled as “traitor of Motherland family members” and prosecuted. They could be sent to Gulag, punished by the involuntary settlement in unpopulated areas, or stripped of citizen’s rights. Being a friend of an enemy of the people automatically placed the person under suspicion.

A significant fraction of the enemies of the people were given this label not because of their hostile actions against the workers’ and peasants’ state, but simply because of their social origin or profession before the revolution: those who used hired labor, high-ranking clergy, former policemen, merchants, etc. Some of them were commonly known as lishentsy (лишенцы, derived from Russian word лишение, deprivation), because by the Soviet Constitution they were deprived of the right of voting. This automatically translated into a deprivation of various social benefits; some of them, e.g., rationing, were at times critical for survival.

Since 1927, Article 20 of the Common Part of the penal code that listed possible “measures of social defence” had the following item 20a: “declaration to be an enemy of the workers with deprivation of the union republic citizenship and hence of the USSR citizenship, with obligatory expulsion from its territory”. Nevertheless, most “enemies of the people” suffered labor camps, rather than expulsion.

In his 1956 speech denouncing Stalin’s cult of personality, Stalin’s successor Nikita Khrushchev called for an end to the use of the term, stating “the formula ‘enemy of the people’ was specifically introduced for the purpose of physically annihilating such individuals” who disagreed with Stalin.[5] For decades afterwards, “It was so omnipresent, freighted and devastating in its use under Stalin that nobody [in Russia] wanted to touch it. … except in reference to history and in jokes”, according to an author of a biography of Khrushchev, William Taubman.[5]

The term returned to Russian public discourse in the late 2000s with a number of nationalist and pro-government politicians (most notably Ramzan Kadyrov) calling for restoration of the Soviet approach to the “enemies of the people” defined as all non-system opposition.[9][10][11]

China

In Mao Zedong‘s 1957 speech On the Correct Handling of Contradictions Among the People, he comments that “At the present stage, the period of building socialism, the classes, strata and social groups which favour, support and work for the cause of socialist construction all come within the category of the people, while the social forces and groups which resist the socialist revolution and are hostile to or sabotage socialist construction are all enemies of the people.”[12] (According to Philip Short, an author of biographies of Mao and Cambodia’s Khmer Rouge leader Pol Pot, in domestic political struggles Chinese and Cambodian communists rarely if ever used the phrase “enemy of the people” as they were very nationalistic, and saw it as an alien import.)[5]

Nazi Germany

Regarding the Nazi plan to relocate all Jews to Madagascar, the Nazi tabloid Der Stürmer wrote that “The Jews don’t want to go to Madagascar – They cannot bear the climate. Jews are pests and disseminators of diseases. In whatever country they settle and spread themselves out, they produce the same effects as are produced in the human body by germs. … In former times sane people and sane leaders of the peoples made short shrift of enemies of the people. They had them either expelled or killed.”[13]

United States in the 1960s

In the United States during the 1960s leftist organizations such as the Black Panther Party[14][15][16] and Students for a Democratic Society[17] were known to use the term. In one inter-party dispute in February 1971, for example, Black Panther leader Huey P. Newtondenounced two other Panthers as “enemies of the people” for allegedly putting party leaders and members in jeopardy.[15]

Recent usage

United Kingdom

During the aftermath of the referendum on membership of the European Union, the Daily Mail was criticized for a headline describing the judges which ruled (in the Miller case) as “Enemies of the People” for ruling that the process for leaving the European Union (i.e. the triggering of Article 50) would require the consent of the British Parliament. The May administration had hoped to use the powers of the royal prerogative to bypass parliamentary approval.[18] The paper issued character assassinations of all the judges involved in the ruling (Lord Chief Justice Lord Thomas, Sir Terence Etherton, and Lord Justice Sales), and received more than 1,000 complaints to the Independent Press Standards Organisation.[19][20] The Secretary of State for JusticeLiz Truss issued a three line statement defending the independence and impartiality of the judiciary, which some saw as inadequate due to the delayed response and failure to condemn the attacks.[21][22]

United States

On February 17, 2017, President Donald Trump said on Twitter,

The FAKE NEWS media (failing New York TimesNBC NewsABCCBSCNN) is not my enemy, it is the enemy of the American People!

Trump declared these news organizations “fake news” and an enemy of the people.[23][24] Trump repeated the assertion on February 24 at the Conservative Political Action Conference, saying “A few days ago I called the fake news the enemy of the people and they are. They are the enemy of the people.”[25][5] At a June 25, 2018 rally in South Carolina, Trump singled out journalists as “fake newsers” and again called them “the enemy of the people.”[26][27] Some commentators linked these comments to a mass shooting at the offices of a newspaper publisher in Annapolis, Maryland, that took place only days later, on June 28.[28][29][30] On July 19, 2018, following the critical reaction to his meeting with Russian President Vladimir Putin on July 15, 2018 in Helsinki, Finland, Trump tweeted “The Summit with Russia was a great success, except with the real enemy of the people, the Fake News Media.”[31] The New York Times noted Trump’s use of this phrase during his “moments of peak criticism”, and the use of the term by Nazi and Soviet propaganda[32]

On August 2, 2018, after Trump tweeted “FAKE NEWS media… is the enemy of the American People”,[33][34][35] Acosta asked White House Press Secretary Sarah Huckabee Sanders if she would distance herself from that statement. She did not decline nor support the statement. Instead, she argued over her own treatment by the media from a prepared statement she brought to the podium. Acosta’s question came in a wider context of critics by multiple entities (the United Nations and the Inter-American Commission of Human Rights, IACHR) for attacks by President Trump on the free press.[36]

See also

References

https://en.wikipedia.org/wiki/Enemy_of_the_people

Review

Obesity and pancreatic cancer

Abstract

Background

Pancreatic cancer is an invariably fatal malignancy. Cigarette smoking and diabetes are established risk factors, but over the last two decades studies have shown that excess adiposity is an additional independent risk factor with 30–50% of cases thought to be attributed to nutritional factors. The aim of this narrative review is to analyze all the epidemiological evidence on the topic and possible pathophysiology.

Methods

We searched PubMed, Embase, Cochrane Library and Medline, and all available evidence was included. We firstly analyze meta- and pooled analysis. Then we discuss individual studies to identify sources of discrepancies between studies and attempt to delineate pathophysiology.

Results

It is estimated that obese individuals have a relative risk (RR) ranging between 1.19 and 1.47, when compared with those of normal weight, regardless of diabetes or smoking status. No significant differences were found between gender.

Conclusion

There is a measurable increased risk of developing pancreatic cancer in obese individuals, and excess adiposity is related to the condition with a “dose–response” curve.

Hyperinsulinemia and possibly hyperestrogenism secondary to a metabolic syndrome, and independently from diabetes status, appear to be the key elements of the pathogenesis in pancreatic cancer secondary to excess body fat. Increased efforts should therefore be made in tackling the epidemic levels of obesity in the Western world countries.

https://www.sciencedirect.com/science/article/pii/S0960740414000085

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 1122-1126

Listen To Pronk Pops Podcast or Download Shows 1112-1121

Listen To Pronk Pops Podcast or Download Shows 1101-1111

Listen To Pronk Pops Podcast or Download Shows 1091-1100

Listen To Pronk Pops Podcast or Download Shows 1082-1090

Listen To Pronk Pops Podcast or Download Shows 1073-1081

Listen To Pronk Pops Podcast or Download Shows 1066-1073

Listen To Pronk Pops Podcast or Download Shows 1058-1065

Listen To Pronk Pops Podcast or Download Shows 1048-1057

Listen To Pronk Pops Podcast or Download Shows 1041-1047

Listen To Pronk Pops Podcast or Download Shows 1033-1040

Listen To Pronk Pops Podcast or Download Shows 1023-1032

Listen To Pronk Pops Podcast or Download Shows 1017-1022

Listen To Pronk Pops Podcast or Download Shows 1010-1016

Listen To Pronk Pops Podcast or Download Shows 1001-1009

Listen To Pronk Pops Podcast or Download Shows 993-1000

Listen To Pronk Pops Podcast or Download Shows 984-992

Listen To Pronk Pops Podcast or Download Shows 977-983

Listen To Pronk Pops Podcast or Download Shows 970-976

Listen To Pronk Pops Podcast or Download Shows 963-969

Listen To Pronk Pops Podcast or Download Shows 955-962

Listen To Pronk Pops Podcast or Download Shows 946-954

Listen To Pronk Pops Podcast or Download Shows 938-945

Listen To Pronk Pops Podcast or Download Shows 926-937

Listen To Pronk Pops Podcast or Download Shows 916-925

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows 151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 1018, January 17, 2018, Story 1: Ageism Rampant in White House Press Questioning of President Trump Physician — Backlash of Older Voters In 2018 and 2020 Election —  Trump in Excellent Health and Big Lie Media Nuts of Lying Lunatic Left — Videos –Story 2: 70 Percent of Americans Are Overweight or Obese — President Trump Joins The Huge Fluffy Majority — Videos — Story 3: President Trump’s Fake News Awards of 2017 — Big Lie Media’s Junk Journalism Progressive Propaganda Exposed — Videos

Posted on January 18, 2018. Filed under: Addiction, American History, Biology, Blogroll, Breaking News, Chemistry, Communications, Countries, Diet, Donald J. Trump, Donald J. Trump, Donald Trump, Drugs, Elections, Employment, Exercise, Food, Freedom of Speech, Government Spending, Health, Health Care, Hillary Clinton, Hillary Clinton, History, Human, Human Behavior, Illegal Drugs, Illegal Immigration, Independence, Insurance, IRS, Language, Law, Legal Drugs, Life, Media, Medical, Medicare, Medicine, National Interest, Obama, People, Philosophy, Photos, Politics, Polls, President Trump, Privacy, Radio, Raymond Thomas Pronk, Regulation, Scandals, Science, Socials Security, Success, Surveillance/Spying, Taxation, Taxes, Trump Surveillance/Spying, United States of America, War, Wealth, Weather, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 1018, January 17, 2018

Pronk Pops Show 1017, January 16, 2018

Pronk Pops Show 1016, January 10, 2018

Pronk Pops Show 1015, January 9, 2018

Pronk Pops Show 1014, January 8, 2018

Pronk Pops Show 1013, December 13, 2017

Pronk Pops Show 1012, December 12, 2017

Pronk Pops Show 1011, December 11, 2017

Pronk Pops Show 1010, December 8, 2017

Pronk Pops Show 1009, December 7, 2017

Pronk Pops Show 1008, December 1, 2017

Pronk Pops Show 1007, November 28, 2017

Pronk Pops Show 1006, November 27, 2017

Pronk Pops Show 1005, November 22, 2017

Pronk Pops Show 1004, November 21, 2017

Pronk Pops Show 1003, November 20, 2017

Pronk Pops Show 1002, November 15, 2017

Pronk Pops Show 1001, November 14, 2017 

Pronk Pops Show 1000, November 13, 2017

Pronk Pops Show 999, November 10, 2017

Pronk Pops Show 998, November 9, 2017

Pronk Pops Show 997, November 8, 2017

Pronk Pops Show 996, November 6, 2017

Pronk Pops Show 995, November 3, 2017

Pronk Pops Show 994, November 2, 2017

Pronk Pops Show 993, November 1, 2017

Pronk Pops Show 992, October 31, 2017

Pronk Pops Show 991, October 30, 2017

Pronk Pops Show 990, October 26, 2017

Pronk Pops Show 989, October 25, 2017

Pronk Pops Show 988, October 20, 2017

Pronk Pops Show 987, October 19, 2017

Pronk Pops Show 986, October 18, 2017

Pronk Pops Show 985, October 17, 2017

Pronk Pops Show 984, October 16, 2017 

Pronk Pops Show 983, October 13, 2017

Pronk Pops Show 982, October 12, 2017

Pronk Pops Show 981, October 11, 2017

Pronk Pops Show 980, October 10, 2017

Pronk Pops Show 979, October 9, 2017

Pronk Pops Show 978, October 5, 2017

Pronk Pops Show 977, October 4, 2017

Pronk Pops Show 976, October 2, 2017

Pronk Pops Show 975, September 29, 2017

Pronk Pops Show 974, September 28, 2017

Pronk Pops Show 973, September 27, 2017

Pronk Pops Show 972, September 26, 2017

Pronk Pops Show 971, September 25, 2017

Pronk Pops Show 970, September 22, 2017

Pronk Pops Show 969, September 21, 2017

Pronk Pops Show 968, September 20, 2017

Pronk Pops Show 967, September 19, 2017

Pronk Pops Show 966, September 18, 2017

Pronk Pops Show 965, September 15, 2017

Pronk Pops Show 964, September 14, 2017

Pronk Pops Show 963, September 13, 2017

Pronk Pops Show 962, September 12, 2017

Pronk Pops Show 961, September 11, 2017

Pronk Pops Show 960, September 8, 2017

Pronk Pops Show 959, September 7, 2017

Pronk Pops Show 958, September 6, 2017

Pronk Pops Show 957, September 5, 2017

See the source image

See the source image

See the source image

See the source image

Story 1: Ageism Rampant in White House Press Questioning of President Trump Physician — Backlash of Older Voters In 2018 and 2020 Election —  Trump in Excellent Health and Big Lie Media Nuts of Lying Lunatic Left — Videos —

 

See the source image

See the source image

Doctors give president a clean bill of health

“The president’s overall health is excellent.” (C-SPAN)

Mainstream media hammers physician over Trump’s health

Media upset by Trump’s clean bill of health?

The #MSM Grill Trump’s Docs on His Health But Ignored Hillary’s Neurologic Trauma and 9/11 Collapse

Dr. Gupta: Trump a heart disease risk

Borderline Obese Trump in Excellent Health

Confirmation Bias: Your Brain is So Judgmental

12 Cognitive Biases Explained – How to Think Better and More Logically Removing Bias

Tomi Lahren: ‘Disgusting’ media behavior on Trump’s health

Reporters grill doctor over Trump’s clean bill of health

Trump aces Montreal Cognitive Assessment test

Donald Trump physical examination results full press conference

Are our perceptions of age distorted?

The Roots and Consequences of Ageism in America

Aging: It’s Not What You Think | Thad Polk | TEDxUofM

How to die young at a very old age | Nir Barzilai | TEDxGramercy

Let’s change the way we think about old age | ​Zaria Gorvett | TEDxLausanne

Ageism is all around us – hear how it affects older people around the world

Millennials Show Us What ‘Old’ Looks Like | Disrupt Aging | AARP

Ageism: A short documentary

Michael’s Tutorial on Avoiding Ageism – The Office US

Gabriel Iglesias I’m Not Fat … I’m Fluffy Full Show(2009)

 

 

Ageism

From Wikipedia, the free encyclopedia

Ageism (also spelled “agism“) is stereotyping of and discrimination against individuals or groups on the basis of their age. This may be casual or systematic.[1][2] The term was coined in 1969 by Robert Neil Butler to describe discrimination against seniors, and patterned on sexism and racism.[3] Butler defined “ageism” as a combination of three connected elements. Among them were prejudicial attitudes towards older people, old age, and the aging process; discriminatory practices against older people; and institutional practices and policies that perpetuate stereotypes about elderly people.[4]

While the term is also used to name prejudice and discrimination against adolescents and children, including ignoring their ideas because they are too young, or assuming that they should behave in certain ways because of their age,[5] the term is predominantly used in relation to the treatment of older people. Moreover, it has been pointed out that stigmatization does not only occur outside of the cohesively imagined group of the elderly but likewise takes place within the stigmatized group itself.[6]Fear of death and fear of disability and dependence are major causes of ageism; avoiding, segregating, and rejecting older people are coping mechanisms that allow people to avoid thinking about their own mortality.[7]

It can also be passive and covert (e.g., a movie that shows only young people inhabiting a locality and no children, infants or old people are shown in the area) to drive the notion that the place is ‘young and romantic’.

Classification

Distinction from other age-related bias

Ageism in common parlance and age studies usually refers to negative discriminatory practices against old people, people in their middle years, teenagers and children. There are several forms of age-related bias. Adultism is a predisposition towards adults, which is seen as biased against children, youth, and all young people who are not addressed or viewed as adults.[8]Jeunism is the discrimination against older people in favor of younger ones. This includes political candidacies, jobs, and cultural settings where the supposed greater vitality and/or physical beauty of youth is more appreciated than the supposed greater moral and/or intellectual rigor of adulthood. Adultcentricism is the “exaggerated egocentrism of adults.”[9]Adultocracy is the social convention which defines “maturity” and “immaturity,” placing adults in a dominant position over young people, both theoretically and practically.[10]Gerontocracy is a form of oligarchical rule in which an entity is ruled by leaders who are significantly older than most of the adult population.[11]Chronocentrism is primarily the belief that a certain state of humanity is superior to all previous and/or future times.[12]

Based on a conceptual analysis of ageism, a new definition of ageism was introduced by Iversen, Larsen, & Solem in 2009. This definition constitutes the foundation for higher reliability and validity in future research about ageism and its complexity offers a new way of systemizing theories on ageism: “Ageism is defined as negative or positive stereotypes, prejudice and/or discrimination against (or to the advantage of) elderly people on the basis of their chronological age or on the basis of a perception of them as being ‘old’ or ‘elderly’. Ageism can be implicit or explicit and can be expressed on a micro-, meso- or macro-level” (Iversen, Larsen & Solem, 2009).[13]

Other conditions of fear or aversion associated with age groups have their own names, particularly: paedophobia, the fear of infants and children; ephebiphobia, the fear of youth,[14] sometimes also referred to as an irrational fear of adolescents or a prejudice against teenagers;[15] and gerontophobia, the fear of elderly people.[16]

Implicit ageism

Implicit ageism is the term used to refer to the implicit or subconscious thoughts, feelings, and behaviors one has about older or younger people. These may be a mixture of positive and negative thoughts and feelings, but gerontologist Becca Levy reports that they “tend to be mostly negative.”[17]

Stereotyping

Stereotyping is a tool of cognition which involves categorizing into groups and attributing characteristics to these groups. Stereotypes are necessary for processing huge volumes of information which would otherwise overload a person and are generally accurate descriptors of group characteristics, though some stereotypes are inaccurate.[18] However, they can cause harm when the content of the stereotype is incorrect with respect to most of the group or where a stereotype is so strongly held that it overrides evidence which shows that an individual does not conform to it. For example, age-based stereotypes prime one to draw very different conclusions when one sees an older and a younger adult with, say, back pain or a limp. One might well assume that the younger person’s condition is temporary and treatable, following an accident, while the older person’s condition is chronic and less susceptible to intervention. On average, this might be true, but plenty of older people have accidents and recover quickly and very young people (such as infants, toddlers and small children) can become permanently disabled in the same situation. This assumption may have no consequence if one makes it in the blink of an eye as one is passing someone in the street, but if it is held by a health professional offering treatment or managers thinking about occupational health, it could inappropriately influence their actions and lead to age-related discrimination. Managers have been accused, by Erdman Palmore, as stereotyping older workers as being resistant to change, not creative, cautious, slow to make judgments, lower in physical capacity, uninterested in technological change, and difficult to train.[19] Another example is when people are rude to children because of their high pitched voice, even if they are kind and courteous. A review of the research literature related to age stereotypes in the workplace was recently published in the Journal of Management.[20]

Contrary to common and more obvious forms of stereotyping, such as racism and sexism, ageism is more resistant to change. For instance, if a child believes in an ageist idea against the elderly, fewer people correct them, and, as a result, individuals grow up believing in ageist ideas, even elders themselves.[21] In other words, ageism can become a self-fulfilling prophecy.

Ageist beliefs against the elderly are commonplace in today’s society. For example, an older person who forgets something could be quick to call it a “senior moment,” failing to realize the ageism of that statement. People also often utter ageist phrases such as “dirty old man” or “second childhood,” and elders sometimes miss the ageist undertones.[21]

In a classic study, researchers analyzed the effects of ageism among the elderly.[22] They performed memory tests on three selected groups: residents of China, deaf North Americans, and hearing North Americans. In the three groups, the Chinese residents were presumably the least exposed to ageism, with lifelong experience in a culture that traditionally venerates older generations. Lifelong deaf North Americans also faced less exposure to ageism in contrast to those with typical hearing, who presumably had heard ageist comments their whole life. The results of the memory tests showed that ageism has significant effects on memory.

The gap in the scores between the young and old North Americans with normal hearing were double those of the deaf North Americans and five times wider than those of the Chinese participants. The results show that ageism undermines ability through its self-fulfilling nature.[21] The study was investigating the effect of the stereotype threat, which has been explored as a possible reason for memory deficits,[23] though the stereotype threat has been criticized.[24]

On the other hand, when elders show larger independence and control in their lives, defying ageist assumptions, they are more likely to be healthier, both mentally and physically, than other people their age.[21]

Research indicates that old people are stereotyped as scoring lower on measures of impulsivity, activism, antagonism and openness while young people are stereotyped as scoring higher on these measures. This was found to be universal across cultures and was also found to be reasonably accurate (varying depending on how the accuracy was assessed and the type of stereotype), though differences were consistently exaggerated.[25]

Prejudice

Ageist prejudice is a type of emotion which is often linked to the cognitive process of stereotyping. It can involve the expression of derogatory attitudes, which may then lead to the use of discriminatory behavior. Where older or younger contestants were rejected in the belief that they were poor performers, this could well be the result of stereotyping. But older people were also voted for on a stage in a game where it made sense to target the best performers. This can only be explained by a subconscious emotional reaction to older people; in this case, the prejudice took the form of distaste and a desire to exclude oneself from the company of older people.[26]

Stereotyping and prejudice against different groups in society does not take the same form. Age-based prejudice and stereotyping usually involves older or younger people being pitied, marginalized, or patronized. This is described as “benevolent prejudice” because the tendency to pity is linked to seeing older or younger people as “friendly” but “incompetent.” This is similar to the prejudice most often directed against women and disabled people. Age Concern‘s survey revealed strong evidence of “benevolent prejudice.” 48% said that over-70s are viewed as friendly (compared to 27% who said the same about under-30s). Meanwhile, only 26% believe over-70s are viewed as capable (with 41% saying the same about under-30s).[27]

The figure for friendliness of under-30s is, conversely, an example of Hostile Prejudice. Hostile prejudice based on hatred, fear, aversion, or threat often characterizes attitudes linked to race, religion, disability, and sex. An example of hostile prejudice toward youth is the presumption without any evidence that a given crime was committed by a young person. Rhetoric regarding intergenerational competition can be motivated by politics. Violence against vulnerable older people can be motivated by subconscious hostility or fear; within families, this involves impatience and lack of understanding. Equality campaigners are often wary of drawing comparisons between different forms of inequality.[citation needed]

The impact of “benevolent” and “hostile” prejudice tends to be different. The warmth felt towards older or younger people and the knowledge that many have no access to paid employment means there is often public acceptance that they are deserving of preferential treatment—for example, less expensive movie and bus fares. But the perception of incompetence means older and younger people can be seen as “not up to the job” or “a menace on the roads,” when there is little or exaggerated evidence to support this. Prejudice also leads to assumptions that it is “natural” for older or younger people to have lower expectations, reduced choice and control, and less account taken of their views.[citation needed]

Digital ageism

Digital ageism refers to the prejudices faced by older adults in the digital world. A few examples of the subtle ways in which digital ageism operates in cultural representations, research, and everyday life: Generational segregation naturalizes youth as digitally adept and the old as digital dunces. There is no empirical evidence, though, for a digital divide between older and younger people, with the former never and the latter always capable to use digital media; a far more accurate description is that of a digital spectrum.[28][29][30] The reason for the myth of declining capabilities of older people could be that many cultural representations have long histories reproducing images of the life cycle as a mountain, where we peak in middle age then decline[29][31][32] Older adults’ experiences are often excluded from research agendas on digital media, and ageism is ensconced within disciplines such as mass communication studies. For example, in a media diffusionist perspective,[33] the practices of seniors are depicted as either negligible or as lagging, and the equation of diffusion with individual ownership can hide practical ‘work-arounds’ such as cell phone sharing or missed calls used by older couples on fixed incomes.[34][35] Ageism is also inadvertently embedded in the ways that we generate statistics, for example through data collected based on large age categories (e.g., ’60+’) foisting anyone over 60 into ‘the grey zone’ which obscures differences.[36]

Visual ageism

The term visual ageism was coined in 2017 by Loos and Ivan. They define visual ageism as “the social practice of visually underrepresenting older people or misrepresenting them in a prejudiced way”.[37] We are facing a shift from visual ageism characterized by underrepresentation and the negative representation of older people to a representation of older age characterized by images of stereotypically third age older adults (enjoying life and living their golden years), while older adults in their fourth age (inactive and unable to live independently) remain invisible. A review of empirical studies conducted since 1950 in Europe and North America[37] reveals that print and television advertisements started this transition towards a more positive visual representation of older adults in their age during the last decade of the 20th century, followed by television programs some years later, while older adults in their fourth age remain invisible. This is probably due to the increase in third age rhetoric in the media, picturing older people as healthy and as potential consumers, enjoying life and living their golden years. Media representations of older people have moved from visual under- and misrepresentation (negative images)[38][39][40][41] to more positive depictions[42][43][37] These days, visual ageism in the media tends to come wrapped in the guise of the positive attributes of third age representations of older people, while adults in their fourth age continue to be underrepresented. One possible explanation for this is that healthy third agers might prefer not to be associated with fourth agers, as they remind them too starkly of what lies ahead in their own near future. Although this discomfort or even fear about mortality is undeniably common, from a societal point of view this kind of (self)ageism is hurtful to fourth agers as a group and in a sense to third agers as well, as they risk to become fourth agers themselves one day.[37]

Discrimination

Age discrimination is the result of actions taken to deny or limit opportunities to people on the basis of age. These are usually actions taken as a result of one’s ageist beliefs and attitudes. Age discrimination occurs on both a personal and institutional level.[2]

On a personal level, an older person may be told that he or she is too old to engage in certain physical activities, like an informal game of basketball between friends and family. A younger person may be told they are too young to get a job or help move the dining room table. On an institutional level, there are policies and regulations in place that limit opportunities to people of certain ages and deny them to all others. The law, for instance, requires that all people must be at least 16 years old in order to obtain a driver’s license in the United States. There are also government regulations that determine when a worker may retire. Currently, in the US, a worker must be between 65 and 67 years old (depending upon his or her birth year) before becoming eligible for full Social Security retirement benefits (age 62 for 70% benefits) but some company pension plans begin benefits at earlier ages.[citation needed]

A 2006/2007 survey done by the Children’s Rights Alliance for England and the National Children’s Bureau asked 4,060 children and young people whether they have ever been treated unfairly based on various criteria (race, age, sex, sexual orientation, etc.). A total of 43% of British youth surveyed reported experiencing discrimination based on their age, far eclipsing other categories of discrimination like sex (27%), race (11%), or sexual orientation (6%).[44] Consistently, a study based on the European Social Survey found that whereas 35% of Europeans reported exposure ageism, only 25% reported exposure to sexism and as few as 17% reported exposure to racism.[45]

Ageism has significant effects in two particular sectors: employment and health care. Age discrimination has contributed to disparities in health between men and women. Reducing ageism and sexism would promote improved doctor-patient relationships and reduce ageist stereotypes in the healthcare industry.[46]

Employment

The concept of ageism was originally developed to refer to prejudice and discrimination against older people and middle age, but has expanded to include children and teenagers.[27] Like racial and gender discrimination, age discrimination, at least when it affects younger workers, can result in unequal pay for equal work. Unlike racial and gender discrimination, however, age discrimination in wages is often enshrined in law. For example, in both the United States[47] and the United Kingdom[48]minimum wage laws allow for employers to pay lower wages to young workers. Many state and local minimum wage laws mirror such an age-based, tiered minimum wage. As well, the Fair Labor Standards Act of 1938 was amended in 1986 to allow the United States Secretary of Labor to provide special certificates to allow an employer to pay less than the minimum wage to individuals whose earning or productive capacity is impaired by age, physical or mental deficiency, or injury.[49] These employees must still be paid wages that are related to the individual’s productivity and commensurate with those paid to similarly located and employed non-handicapped workers.[49]Midlife workers, on average, make more than younger workers do, which reflects educational achievement and experience of various kinds (job-specific, industry-specific, etc.). The age-wage peak in the United States, according to Census data, is between 45 and 54 years of age. Seniority in general accords with respect as people age, lessening ageism. Statistical discrimination refers to limiting the employment opportunities of an individual based on stereotypes of a group to which the person belongs. Limited employment opportunities could come in the form of lower pay for equal work or jobs with little social mobility. Younger female workers were historically discriminated against, in comparison with younger men, because it was expected that, as young women of childbearing years, they would need to leave the work force permanently or periodically to have children.[50] However, midlife female workers may also experience discrimination based on their appearance[51] and may feel less visible and undervalued[52] in a culture where emphasis is on maintaining an approved standard of beauty, e.g. ‘thin, pretty, White, and young’.[53] However, the same standard could have no effect on male colleagues of the same age.[52]Labor regulations also limit the age at which people are allowed to work and how many hours and under what conditions they may work. In the United States, a person must generally be at least 14 years old to seek a job, and workers face additional restrictions on their work activities until they reach age 16.[54] Many companies refuse to hire workers younger than 18. While older workers benefit more often from higher wages than do younger workers, they face barriers in promotions and hiring. Employers also encourage early retirementor layoffs disproportionately more for older or more experienced workers.

Some political offices have qualifications that discriminate on the basis of age as a proxy for experience, education, or accumulated wisdom. For example, the President of the United States must be at least 35 years old; a United States Senator must be at least 30; and a United States Congress member must be at least 25. In the UK, age discrimination against older people has been prohibited in employment since 2006. Since then, the number of age discrimination cases rose dramatically. The laws protect anyone over the age of 16 who is young as well as old. There were over 6,800 claims submitted to the Employment Tribunal in 2010/11 compared with just 900 in 2006/2007 (immediately after the Regulations came in force).[55] However, the figures for 2011/2012 show a 47% fall in the number of claims, and commentators have suggested that the repeal of the Default Retirement Age may be the reason behind this.

Age discrimination in hiring has been shown to exist in the United States. The Equal Employment Opportunity Commission‘s first complainants were female flight attendants complaining of (among other things) age discrimination.[56] In 1968, the EEOC declared age restrictions on flight attendants’ employment to be illegal sex discrimination under Title VII of the Civil Rights Act of 1964.[57] However, Joanna Lahey, professor at The Bush School of Government and Public Service at Texas A&M, found recently that firms are more than 40% more likely to interview a young adult job applicant than an older job applicant.[58] All states in the US prohibit youth under 14 from working with a handful of exceptions, and prohibit youth under 18 from working in hazardous occupations. They are also paid a lower minimum wage and not allowed to work full-time.

Also in Europe, pervasive levels of age discrimination are found in BelgiumEnglandFrance, Spain, and Sweden. Job candidates revealing older age are found to get 39% (in Belgium) to 72% (in France) less job interview invitations compared to equal candidates revealing a younger name.[59][60][61][62][63][64][65] In addition, In a survey for the University of Kent, England, 29% of respondents stated that they had suffered from age discrimination. This is a higher proportion than for gender or racial discrimination. Dominic Abramssocial psychology professor at the university, concluded that Ageism is the most pervasive form of prejudice experienced in the UK population.[66] Discrimination is found to be heterogeneous by the activity older candidates undertook during their additional post-educational years. In Belgium, they are only discriminated if they have more years of inactivity or irrelevant employment.[59]

According to Dr. Robert M. McCann, an associate professor of management communication at the University of Southern California‘s Marshall School of Business, denigrating older workers, even if only subtly, can have an outsized negative impact on employee productivity and corporate profits.[citation needed] For American corporations, age discrimination can lead to significant expenses. In Fiscal Year 2006, the U.S. Equal Employment Opportunity Commission received nearly 17,000 charges of age discrimination, resolving more than 14,000 and recovering $51.5 million in monetary benefits. Costs from lawsuit settlements and judgments can run into the millions, most notably with the $250 million paid by the California Public Employees’ Retirement System (CalPERS) under a settlement agreement in 2003.[67][68]

Hollywood

Ageism in Hollywood, specifically in terms of women, is profound, from the way youth is praised to the lack of jobs for older actresses. The way youth is praised reflects directly on the way older women are presented in the media. President and CEO of the American Association of Advertising Agencies, O. Burtch Drake, spoke in terms of older women’s representation throughout the media stating “older women are not being portrayed at all; there is no imagery to worry about.”[69] Women over fifty are not the center of attention and if an actress is older they are expected to act anything but their age.[70] These same women who have been acting since their teenage years, who have always been told to act their age, now must change the dynamic of their job by not acting their age when they get to be considered old by society and the media. The standards set in film are fixated upon youth – sexuality, beauty, physicality. Movies that portray women acting their own age (i.e. a 50-year-old acting 50 years old) seems exaggerated and unrealistic because it does not fit the norms associated with women in film and media.[70] Women are forced to feel that they must continuously improve upon their looks to be seen and they can be replaced by a younger model of themselves. “Silver ceiling” references the new type of ceiling older workers in the entertainment industry, especially women, are being faced with. Underemployment of older actresses surpasses that of older actors because of the typical pairing of older actors with younger actresses in films.[71] BBC news anchor, Nigel Kay, found in a survey that “on television older men significantly outnumber older women by about 70 percent to 30 percent.”[69] An issue amongst older women is that their voices are not being heard, which is especially true for older actresses in Hollywood. The issues about employment they are bringing to light as well as the complaints they have are not being taken seriously and they are being excluded from conversations about Hollywood and employment.[72]

Because of the limited ages the film industry portrays and the lack of older actresses, society as a whole has a type of illiteracy about sexuality and those of old age. There is an almost inherent bias about what older women are capable of, what they do, and how they feel.[73] Amongst all ages of actresses there is the attempt to look youthful and fitting to the beauty standards by altering themselves physically, many times under the hands of plastic surgeons.[70] Women become frightful of what they will be seen as if they have wrinkles, cellulite, or any other signifier of aging.[71] As women reach their forties and fifties, pressure to adhere to societal beauty norms seen amongst films and media intensifies in terms of new cosmetic procedures and products that will maintain a “forever youthful” look.[71] In terms of sexuality, older women are seen as unattractive, bitter, unhappy, unsuccessful in films. With older women not being represented in the media and film industries, specifically in Hollywood, thoughts of underachievement, ugliness, and disgust crowd the thoughts of older women as they fail to meet beauty norms. This can cause depression, anxiety, and self-esteem issues in general.[71] “In one survey, women reported feeling more embarrassed about their age than by their masturbation practices or same-gender sexual encounters.”[71] Women are forced to feel that they must continuously improve upon their looks to be seen and they can be replaced by a younger model of themselves.

The ideal that younger actresses are better than older actresses in Hollywood can be seen by the preferences of the people who are watching movies. Movie spectators display discrimination against older women in Hollywood. A study between 1926-1999 proved that older men in Hollywood had more leading roles than women who were the same age as them.[74] There are many cases where leading actors play the attractive love interest for longer than women.[71] This portrayal of women never aging but men aging can have a negative affect on not only actresses in Hollywood but also women who are not in the media.[71] There are fewer older actresses that get leading roles than young actresses, this promotes the idea that women do not age and that older women are less attractive. This can be harmful to women because they will strive for something that is impossible to have, eternal youth.[71]

What some people think of as old other people may not. An actress in Hollywood may not consider herself old but can be told she is too old for a part. A very well known example of this is what happened to the actress Maggie Gyllenhaal, “she was recently turned down for a role in a movie because she was too old to play the love interest for a 55-year-old man.”[75] When a woman is told she is old she can start to believe that she is. A woman can start acting as if she is older than she believes because she internalizes what other people are saying and what they think about her.[76]

In film the female body is depicted in different states of dress, and portrayed differently depending on the age of the actress. Their clothing is used as an identity marker of the character. Young women are put into revealing and sexy costumes whereas older women often play the part of a mother or grandmother clad in appropriate attire. This can include a bonnet or apron as she carries about her matronly duties.[77] This can lead both men and women to perceive the female body in a certain way based on what is seen on screen. Annette Kuhn said twenty years ago that “One of the major theoretical contributions of the women’s movement has been its insistence on the significance of cultural factors, in particular in the form of socially dominant representations of women and the ideological character of such representation, both in constituting the category ‘woman’ and in delimiting and defining what has been called the ‘sex-gender system'”[77] Women’s bodies are often seen as an object to be looked at and desired by men. As women get older and enter their post-menopausal years, they no longer are examples of the ideal feminine model. Added to that is the idea that females become mentally unstable as they enter their older years. “They become quarrelsome, vexatious and overbearing, petty and stingy; that is to say they exhibit typically sadistic and anal-erotic traits that they did not possess earlier…(Freud 1958,323-24)”[77] Ageism is not new to Hollywood and has been around since the time of silent films. When transitioning from silent movies to talking motion pictures, Charlie Chaplin (a well known silent movie actor) said in an interview that “It’s beauty that matters in pictures-nothing else….Pictures! Lovely looking girls…What if the girls can’t act?…Certainly I prefer to see, say, Dolores Costello [a 1920s silent movie star], in a thin tale than some aged actress of the stage (Walker 1979,132)”.[77]

Healthcare

There is considerable evidence of discrimination against the elderly in health care.[78][79][80] This is particularly true for aspects of the physician-patient interaction, such as screening procedures, information exchanges, and treatment decisions. In the patient-physician interaction, physicians and other health care providers may hold attitudes, beliefs, and behaviors that are associated with ageism against older patients. Studies have found that some physicians do not seem to show any care or concern toward treating the medical problems of older people. Then, when actually interacting with these older patients on the job, the doctors sometimes view them with disgust and describe them in negative ways, such as “depressing” or “crazy.”[81] For screening procedures, elderly people are less likely than younger people to be screened for cancers and, due to the lack of this preventative measure, less likely to be diagnosed at early stages of their conditions.[82]

After being diagnosed with a disease that may be potentially curable, older people are further discriminated against. Though there may be surgeries or operations with high survival rates that might cure their condition, older patients are less likely than younger patients to receive all the necessary treatments. For example, health professionals pursue less aggressive treatment options in older patients,[83] and fewer adults are enrolled in tests of new prescription drugs.[84] It has been posited that this is because doctors fear their older patients are not physically strong enough to tolerate the curative treatments and are more likely to have complications during surgery that may end in death.

Other research studies have been done with patients with heart disease, and, in these cases, the older patients were still less likely to receive further tests or treatments, independent of the severity of their health problems. Thus, the approach to the treatment of older people is concentrated on managing the disease rather than preventing or curing it. This is based on the stereotype that it is the natural process of aging for the quality of health to decrease, and, therefore, there is no point in attempting to prevent the inevitable decline of old age.[81][82]

Furthermore, caregivers further undermine the treatment of older patients by helping them too much, which decreases independence,[85] and by making a generalized assumption and treating all elderly as feeble.[21]

Differential medical treatment of elderly people can have significant effects on their health outcomes, a differential outcome which somehow escapes established protections.

In 2017, the European Court of Human Rights ruled in favor of Maria Ivone Carvalho Pinto de Sousa Morais, who had had an operation that was mishandled and rendered her unable to have sex. Portuguese judges had previously reduced damages to her in 2014, ruling then that the operation, which occurred when she was 50, had happened at “an age when sex is not as important as in younger years.” The European Court of Human Rights rejected that decision, with the majority’s ruling stating in part, “The question at issue here is not considerations of age or sex as such, but rather the assumption that sexuality is not as important for a 50-year-old woman and mother of two children as for someone of a younger age. That assumption reflects a traditional idea of female sexuality as being essentially linked to childbearing purposes and thus ignores its physical and psychological relevance for the self-fulfillment of women as people.”[86]

Effects of ageism

Ageism has significant effects on the elderly and young people. The stereotypes and infantilization of older and younger people by patronizing language affects older and younger people’s self-esteem and behaviors. After repeatedly hearing a stereotype that older or younger people are useless, older and younger people may begin to feel like dependent, non-contributing members of society. They may start to perceive themselves in terms of the looking-glass self—that is, in the same ways that others in society see them. Studies have also specifically shown that when older and younger people hear these stereotypes about their supposed incompetence and uselessness, they perform worse on measures of competence and memory.[87] These stereotypes then become self-fulfilling prophecies. According to Becca Levy‘s Stereotype Embodiment Theory, older and younger people might also engage in self-stereotypes, taking their culture’s age stereotypes—to which they have been exposed over the life course—and directing them inward toward themselves. Then this behavior reinforces the present stereotypes and treatment of the elderly.[17][81]

Many overcome these stereotypes and live the way they want, but it can be difficult to avoid deeply ingrained prejudice, especially if one has been exposed to ageist views in childhood or adolescence.

Australia

Australia has had age discrimination laws for some time.[88] Discrimination on the basis of age is illegal in each of the states and territories of Australia. At the national level, Australia is party to a number of international treaties and conventions that impose obligations to eliminate age discrimination.[89]

The Australian Human Rights Commission Act 1986 established the Australian Human Rights Commission and bestows on this Commission functions in relation to a number of international treaties and conventions that cover age discrimination.[89][90] During 1998-1999, 15% of complaints received by the Commission under the Act were about discrimination on the basis of age.[89]

Age discrimination laws at the national level were strengthened by the Age Discrimination Act 2004, which helps to ensure that people are not subjected to age discrimination in various areas of public life, including employment, the provision of goods and services, education, and the administration of Australian government laws and programs. The Act, however, does provide for exemptions in some areas, as well as providing for positive discrimination, that is, actions which assist people of a particular age who experience a disadvantage because of their age.[90]

In 2011, for the first time a position of Age Discrimination Commissioner was created within the Australian Human Rights Commission. The new Commissioner’s responsibilities include raising awareness among employers about the beneficial contributions that senior Australians as well as younger employees can make in the workforce.[91]

Every state in Australia has a probationary plate system for drivers. This is allowed because the Age Discrimination Act says that, in some circumstances, treating someone differently because of their age won’t be against the law. This is known as an exemption and includes
•things done in compliance with Commonwealth laws, including laws about taxation, social security and migration
•things done in compliance with state and territory laws
•certain health and employment programmes
•youth wages or direct compliance with industrial agreements and awards. [92]

Canada

In Canada, Article 718.2, clause (a)(i), of the Criminal Code defines as aggravating circumstances, among other situations, “evidence that the offence was motivated by … age”.[93][94]

Mandatory retirement was ended in Canada in December 2011,[95] but 74% of Canadians still consider age discrimination to be a problem.[96]

Nigeria

In November 2011, the Nigerian House of Representatives considered a bill which would outlaw age discrimination in employment.[97]

Philippines

At least two bills has been filed before the 16th Congress of the Philippines seeking to address age discrimination in employment in the country. The Blas Ople Policy Center, a non-government organization, asserts that responsibilities of making livelihood in a household has shifted to younger members of the family due to bias against hiring people older than 30 years of age. The organization also added that age discrimination contributes to the unemployment rate and acts as a hurdle to inclusive growth in the country. Overseas Filipino Workers returning from abroad seeking to find work in the country were tagged as vulnerable to age discrimination.[98][99]

United States

In the U.S., each state has its own laws regarding age discrimination, and there are also federal laws.[100] In California, the Fair Employment and Housing Act forbids unlawful discrimination against persons age 40 and older. The FEHA is the principal California statute prohibiting employment discrimination, covering employers, labor organizationsemployment agencies, apprenticeship programs and/or any person or entity who aids, abets, incites, compels, or coerces the doing of a discriminatory act. In addition to age, it prohibits employment discrimination based on race or color; religion; national origin or ancestry, disability, mental type or medical condition; marital status; sex or sexual orientation; and pregnancy, childbirth, or related medical conditions.[101] Although there are many protections for age-based discrimination against older workers (as shown above) there are less protections for younger workers.[citation needed]

In September 2016, California passed state bill AB-1687, an anti-ageism law taking effect on January 1, 2017, requiring “commercial online entertainment employment” services that allow paid subscribers to submit information and resumes (such as IMDB Pro), to honor requests to have their ages and birthdays removed. The bill was supported by SAG-AFTRA‘s former and current presidents Ken Howard and Gabrielle Carteris, who felt that the law would help to reduce ageism in the entertainment industry.[102] On February 23, 2017, Judge Vince Girdhari Chhabria issued a stay on the bill pending a further trial, claiming that it was “difficult to imagine how AB 1687 could not violate the First Amendment” because it inhibited the public consumption of factual information.[103]

The District of Columbia and twelve states define age as a specific motivation for hate crimes – California, Florida, Iowa, Hawaii, KansasLouisianaMaineMinnesotaNebraskaNew Mexico, New York and Vermont.[104][105]

The federal government governs age discrimination under the Age Discrimination in Employment Act of 1967 (ADEA). The ADEA prohibits employment discrimination based on age with respect to employees 40 years of age or older as well.[106] The ADEA also addresses the difficulty older workers face in obtaining new employment after being displaced from their jobs, arbitrary age limits.[107] The ADEA applies even if some of the minimum 20 employees are overseas and working for a US corporation.[108]

European Union

The European citizenship provides the right to protection from discrimination on the grounds of age. According to Article 21-1 of the Charter of Fundamental Rights of the European Unions:Charter of Fundamental Rights of the European Union#CHAPTER III. EQUALITY, “any discrimination based on any ground such as (…) age, shall be prohibited”.[109]

Additional protection against age discrimination comes from the Framework Directive 2000/78/EC. It prohibits discrimination on grounds of age in the field of employment.[110]

Germany

On 18 August 2006, the General Equal Treatment Act (Allgemeines Gleichbehandlungsgesetz, AGG) came into force. The aim of the AGG is to prevent and abolish discrimination on various grounds including age.[111]

A recent study suggested that youths in Germany feel the brunt of age discrimination.[112]

France

In France, Articles 225-1 through 225-4 of the Penal Code detail the penalization of Ageism, when it comes to an age discrimination related to the consumption of a good or service, to the exercise of an economic activity, to the labor market or an internship, except in the cases foreseen in Article 225-3.[113][114][115]

Belgium

In Belgium, the Law of 25 February 2003 “tending to fight discrimination” punishes Ageism when “a difference of treatment that lacks objective and reasonable justification is directly based on … age”. Discrimination is forbidden when it refers to providing or offering a good or service, to conditions linked to work or employment, to the appointment or promotion of an employee, and yet to the access or participation in “an economic, social, cultural or political activity accessible to the public” (Article 2nd, § 4). Incitement to discrimination, to hatred or to violence against a person or a group on the grounds of (…) age (Article 6) is punished with imprisonment and/or a fine.[116][117] Nevertheless, employment opportunities are worsening for people in their middle years in many of these same countries, according to Martin Kohli et al. in Time for Retirement (1991).

United Kingdom

Barbara Robb, founder of the British pressure group, Aid for the Elderly in Government Institutions (AEGIS), compiled Sans Everything: A Case to Answer, a controversial book detailing the inadequacies of care provided for older people, which prompted a nationwide scandal in the UK in 1976. Although initially official inquiries into these allegations reported that they were “totally unfounded or grossly exaggerated”,[118] her campaigns led to revealing of other instances of ill treatment which were accepted and prompted the government to implement NHS policy changes.[119]

However, in the UK, laws against ageism are new. Age discrimination laws were brought into force in October 2006,[120] and can now be found in the Equality Act 2010. This implements the Equal Treatment Framework Directive 2000/78/EC and protects employees against direct discrimination, indirect discriminationharassment and victimisation. There is also provision in the Equality Act 2010 to prohibit age discrimination in the provision of goods and services, though this has not yet been implemented by the current UK Coalition Government and will not be implemented before October 2012 at the earliest.[needs update][121]

Despite the relatively recent prohibition on age discrimination, there have already been many notable cases and official statistics show a 37% increase in claims in 2009/10[122] and a further 31% increase in 2010/11.[123] Examples include the case involving Rolls Royce,[124] the “Heyday” case brought by Age UK[125] and the recent Miriam O’Reilly case against the BBC.[126]

Recent research suggested that the number of age discrimination claims annually could reach 15,000 by 2015.[127]

The European Social Study survey in 2011 revealed that nearly two out of five people claim to have been shown a lack of respect because of their age. The survey suggested that the UK is riven by intergenerational splits, with half of people admitting they do not have a single friend over 70; this compares with only a third of Portuguese, Swiss and Germans who say that they do not have a friend of that age or older.[128] A Demos study in 2012 showed that three quarters of people in the UK believed there to be not enough opportunities for older and younger people to meet and work together.[129]

The “Grey Pride” campaign has been advocating for a Minister for Older People and its campaign has had some success, with Labour Leader Ed Miliband appointing Liz Kendall as Shadow Minister for Older People.[130]

The artist Michael Freedman, an outspoken advocate against age discrimination within the art world says that “mature students, like me, come to art late in life, so why are we penalised and demotivated? Whatever happened to lifelong learning and the notion of a flexible workforce?”[131]

Advocacy campaigns

Many current and historical intergenerational and youth programs have been created to address the issue of Ageism. Among the advocacy organizations created in the United Kingdom to challenge age discrimination are Age UK and the British Youth Council.

In the United States there have been several historic and current efforts to challenge Ageism. The earliest example may be the Newsboys Strike of 1899, which fought ageist employment practices targeted against youth by large newspaper syndicates in the Northeast. During the Franklin D. Roosevelt Administration, First LadyEleanor Roosevelt was active in the national youth movement, including the formation of the National Youth Administration and the defense of the American Youth Congress. She made several statements on behalf of youth and against Ageism. In one report entitled, “Facing the Problems of Youth,” Roosevelt said of youth,

“We cannot simply expect them to say, ‘Our older people have had experience and they have proved to themselves certain things, therefore they are right.’ That isn’t the way the best kind of young people think. They want to experience for themselves. I find they are perfectly willing to talk to older people, but they don’t want to talk to older people who are shocked by their ideas, nor do they want to talk to older people who are not realistic.”[132]

Students for a Democratic Society formed in 1960 to promote democratic opportunities for all people regardless of age, and the Gray Panthers was formed in 1970 by Maggie Kuhn, with a goal of eliminating Ageism in all forms.[133]Three O’Clock Lobby formed in 1976 to promote youth participation throughout traditionally ageist government structures in Michigan, while Youth Liberation of Ann Arbor started in 1970 to promote youth and fight Ageism.

Aid for the Elderly in Government Institutions (AEGIS) was a British pressure group that campaigned to improve the care of older people in long-stay wards of National Health Servicepsychiatric hospitals.[134][135] The group was founded by Barbara Robb in 1965,[135] and was active until Robb’s death in 1976.[136]

More recent U.S. programs include Americans for a Society Free from Age Restrictions, which formed in 1996 to advance the civil and human rights of young people through eliminating ageist laws targeted against young people, and to help youth counter Ageism in America.[137] The National Youth Rights Association started in 1998 to promote awareness of the legal and human rights of young people in the United States,[138] and the Freechild Project was formed in 2001 to identify, unify and promote diverse opportunities for youth engagement in social change by fighting Ageism.

Related campaigns

  • Director Paul Weitz reported he wrote the 2004 film, In Good Company to reveal how ageism affects youth and adults.[139]
  • In 2002 The Freechild Project created an information and training initiative to provide resources to youth organizations and schools focused on youth rights.[140]
  • In 2006 Lydia Giménez-LLort, an assistant professor of Psychiatry and researcher at the Autonomous University of Barcelona coined the term ‘Snow White Syndrome’ at the ‘Congrés de la Gent Gran de Cerdanyola del Vallès’ (Congress of the Elderly of Cerdanyola del Vallès, Barcelona, Spain) as a metaphor to define Ageism in an easier and more friendly way while developing a constructive spirit against it. The metaphor is based on both the auto-Ageism and adultocracy exhibited by the evil queen of the Snow White fairy tale as well as the social Ageism symbolized by the mirror[141]
  • Since 2008 ‘The Intergenerational Study’ by Lydia Giménez-LLort and Paula Ramírez-Boix from the Autonomous University of Barcelona is aimed to find the basis of the link between grandparents and grandsons (positive family relationships) that are able to minimize the Ageism towards the elderly. Students of several Spanish universities have enrolled in this study which soon will be also performed in USA, Nigeria, Barbados, Argentina and Mexico. The preliminary results reveal that ‘The Intergenerational study questionnaire’ induces young people to do a reflexive and autocritic analysis of their intergenerational relationships in contrast to those shown towards other unrelated old people which results very positive to challenge Ageism. A cortometrage about ‘The International Study’ has been directed and produced by Tomás Sunyer from Los Angeles City College[142]
  • Votes at 16 intends to lower the voting age in the United Kingdom to 16, reducing Ageism and giving 16-year-olds equal pay on the National Minimum Wage. The group claims that 16-year-olds get less money than older people for the same work, angering many 16-year-olds. They additionally postulate that 16-year-olds will have their voice listened to by older people more often.
  • Chilean director, Sebastian Lelio, is creating a U.S. version of his acclaimed 2013 film, “Gloria.”[143] The original film challenges the notion that as women age they become culturally ‘invisible’;[144] they may continue to be powerful, desirable, and sexually active. In the U.S. version, actress Julianne Moore will portray the lead character.[145]

Accusations of ageism

In a recent interview, actor Pierce Brosnan cited ageism as one of the contributing factors as to why he was not asked to continue his role as James Bond in the Bond film Casino Royale, released in 2006.[146]

Also, successful singer and actress Madonna spoke out in her 50s about ageism and her fight to defy the norms of society.[147] In 2015, BBC Radio 1 were accused of ageism after the station didn’t add her new single to their playlist. Similarly, Sex and the City star Kim Cattrall has also raised the issue of ageism.[148]

A 2007 Pew Research Center study found that a majority of American voters would be less likely to vote for a President past a given age[which?], with only 45% saying that age would not matter.[citation needed]

See also

References

https://en.wikipedia.org/wiki/Ageism

Age discrimination in the United States

From Wikipedia, the free encyclopedia

In 2007, the United States’ economy crashed, which affected many people. As a result, the unemployment rate within the U.S. has risen, with people over the age of 50 are facing record unemployment for their age group.[1] Factors that may affect employers’ decisions to hire or retain older workers include:

  • older workers may be more expensive to employ than younger ones,
  • older workers may lack up-to-date skills,
  • older workers may retire before an employer recovers hiring and training costs.

These concerns are mostly unfounded, but they are widespread.[2]

Benefits of employing older workers

Though companies may be reluctant to hire an elderly person, there are many benefits for an elderly person to have a job and be working. One benefit is that having a job can help decrease the mortality rate within the elderly.[3] In addition to living longer, one study found that the elderly that worked part-time had higher life satisfaction.[4]

In addition to the elderly benefiting from working, the companies employing elderly workers can also have several benefits. One study found that workforce professionals had stronger moral and ethical aptitudes, placed a greater importance on work in their lives, and disliked wasting time, more so than those of college students that were new in the working world.[5] In comparison to younger workers, elderly workers were found to be safer, have less counterproductive work behaviors, less work place aggression, less likely to abuse substances on the job, and less likely to be tardy to work.[6] Elderly workers also tend to be more loyal to a company and are able to use their previous work experience to help develop products, processes, and different approaches that help with organizational competitiveness.[7]

Age discrimination

People in the United States may start to contemplate retirement around the age of 60, when they become eligible for retirement benefits through the Social Security program. However, Social Security benefits are not generous, and absent other retirement savings or a pension plan, many Americans want or need to continue to work. Americans who seek Social Security benefits before reaching full retirement age will receive a reduced benefit.[1] Many retirees hold jobs to supplement their Social Security benefits.

According to studies, over the past few years the poverty rate for the group of people that range from 55–64 years old has increased from 8.6 to 9.4, which is the second largest increase for that group since August 1983.[8] One of the reasons that caused this increase in the poverty rate in the older generation is because they are oftentimes discriminated against by companies because of their age. Many companies find the older people as a group act as more of a cost than an asset to the company.[8] Some argue that younger people may discriminate against older workers because they don’t like them, or that they believe older workers are not motivated or lack current job skills.[8]

Most companies choose to offer health care and insurance to all of their employees. The older generation workers often require more benefits from the company due to their age. One worker at the age of 58 who was a two-time cancer survivor and also had fibromyalgiawas laid-off and replaced with a younger girl that was half her age.[8] Although the woman couldn’t prove it, she believed that she was fired and replaced because of her age and the costs that the company incurred by having her as an employee. As a result, because older people are more likely to have health concerns and issues, they are many times the first to be cut from a company. While many age discrimination claims have been filed and have increased drastically, they are very hard to prove and charge against a company.[8]

In order to reduce age discrimination in the United States, Congress passed the Age Discrimination in Employment Act of 1967 (ADEA), a law that provides certain employment protections to workers who are over the age of forty, who work for an employer who has twenty or more employees. For protected workers, the ADEA prohibits discrimination at all levels of employment, from recruitment and hiring, through the employment relationship, and through decisions for layoffs or termination of the employment relationship.[9]

Studies

One researcher decided to make an experiment to test if age discrimination actually exists. For the experiment she created 4,000 mock female résumés and sent them to different companies throughout Boston, Massachusetts as well as St. Petersburg, Florida.[2] Each résumé included the date that the fictitious applicant graduated from high school which indicated the age of each person to the company. The ages of each applicant on the résumés ranged from 35 to 62 years old. The results of the study showed that a younger person was 40 percent more likely to be hired than an older applicant of 50 years or older at the designated companies. As a result, the study proved that companies do often age discriminate against specific groups, especially the older generation.[2]

Another study found that it is not uncommon for employers to use stereotypes to rationalize discriminating against hiring elderly workers. The first of which is the employees’ salary expectations. If an older worker had a job before that had a higher salary, then he/she might keep looking for another job that has a high salary, so hiring him/her is a waste of time to the company. A second reason is that the elderly worker often will have a younger boss, so employers think that the older employee will not be satisfied working for someone who is younger or less experienced.[10]

Causes

There are many reasons for the workplace age discrimination. People are living longer because of healthier lifestyles and advances in medicine. People are working longer because the mandatory retirement age has been eliminated, the recent poor economy has diminished savings and there has been a decline in benefit retirement plans. Thus, more older people are interested in seeking and holding employment.

There are many reasons why older workers may have a difficult time finding work after being laid-off. Many older workers were employed by the same employer for many years, and in some cases that may have been their only job during their entire career.[1] Many older workers are less likely to be skilled at job-seeking, as they haven’t had to search for employment in many years.[1] Also, as the years have passed, companies have turned to more efficient means by offering applications only online. However, while the current generation relies on technology, many older workers may be accustomed to older methods of performing the same labor. Some may find it difficult to use a computer, whether to find and apply for jobs or in the workplace.[1]

Because many of the people in the older generation are less likely to have skills on the computer, their technological inabilities also hold them back from being hired.[1] As the years have passed, many companies have begun to focus using the internet and other programs on the computer, making it more likely they will hire a younger worker that is capable of using technology over an older person that doesn’t know how.[1] This lack of knowledge means that companies would have to provide more training for the elderly person than they would often have to provide for a younger employee. This can be costly and time consuming for companies.[11] Older adults often resist the use of computers for various reasons, such as impaired eyesight and hearing, arthritis and other physical ailments, and reduced cognitive skills, including memory loss and short attention spans, which make surfing the Web more challenging. Learning how to effectively utilize new technology for the elderly can be more demanding due to the fact that learning new skills is stressful both mentally and physically.[12]

The unemployment issue among the older generation not only creates problems for the specific age group, but it also causes policy issues around the nation.[8] The government makes decisions on how to solve the crisis because with this group of people out of work, the older generation is unable to be self-sufficient during a large part of their adult life; a time when they are more likely to have health issues.[8] Also, these people are nearing the time when they will no longer be able to work, and may not be prepared or have the financial means to take care of themselves. As a result, policy makers must try to solve the issue of unemployment by creating more jobs. However, they also must try to create a policy that offers benefits for the older people that are unemployed because they are more likely to be unemployed longer than others.[2]

Solutions

A common solution to become qualified for more jobs and have more opportunities to exit unemployment is to go back to school, whether that is high school or college.[13] Many of the older people do not have a complete high school or college education; therefore, and as a result they do not have the correct training for many jobs that are currently available.[13] However, many older people have found that returning to school would force them to incur more costs than they would if they didn’t go back to school. Taking a class at a local college could cost several thousand dollars. If a person is only a few years away from reaching the age of retirement, they may find it less costly to endure a poor standard of living for a few years and then get their Social Security instead of using part of their limited resources for classes that may never offer them any aid.[13] Another solution for the older generation to become qualified for more jobs is to take instructional courses on how to use computers. Instructional courses may need to incorporate varied instructional styles such as introducing new material and building on prior knowledge by using direct instruction followed by opportunities to integrate and practice new information. Instructors must understand how to best deliver instruction to senior learners in order to provide effective, engaging instruction. Ideal learning environments are ones that are flexible and sensitive to the needs of the senior learner. Once older people gain the skills to use a computer, they will have a greater chance of being hired for a job.[14] An alternative solution is to move to areas of the country that have a better job market. However, older people are more likely to own more assets such as land and their houses. As a result, it would be more difficult and possibly less beneficial for an older person to move and leave these behind.

References

  1. Jump up to:a b c d e f g Rich, Motoko. “For the Unemployed Over 50, Fears of Never Working Again.” The New York Times. 2010 Sept. 19 https://www.nytimes.com/2010/09/20/business/economy/20older.html?pagewanted=all. 3 Dec. 2011.
  2. Jump up to:a b c d Miller, Mark (14 January 2011). “Older unemployed workers half as likely to get hired”. Retrieved 28 September2017.
  3. Jump up^ Blanc, P. D., Katz, P., & Yelin, E. (1996). Mortality risk among elderly workers. “American Journal of Industrial Medicine”, 543-547.
  4. Jump up^ Chang, H., & Yen, S. T. (2011). Full-time, part-time employment and life satisfaction of the elderly. “The Journal of Socio-Economics”, 40(6), 815-823.
  5. Jump up^ Van Ness, R. K., Melinsky, K., Buff, C. L., & Seifert, C. F. (2010). Work ethic: Do new employees mean new work values?. “Managerial Issues”, 22(1), 10-34.
  6. Jump up^ Ng, T. W. H., & Feldman, D. C. (2008). The relationship of age to ten dimensions of job performance. “Journal of Applied Psychology”, 93(2), 392-423.
  7. Jump up^ Shultz, K. S., Olson, D. A., & Wang, M. (2011). Overqualified employees: Perspectives of older workers. “Industrial & Organizational Psychology”, 4(2), 247-249.
  8. Jump up to:a b c d e f g James, Susan. “Unemployment: Companies Cut Pricey Older Workers.” ABC News. 2009 10 Mar. http://abcnews.go.com/Business/Story?id=7042634&page=1. 30 Nov. 2011.
  9. Jump up^ Larson, Aaron (25 July 2016). “Age Discrimination Law”ExpertLaw. Retrieved 28 September 2017.
  10. Jump up^ Roscigno, V. J., Mong, S., Byron, R., & Tester, G. (2007). Age discrimination, social closure and employment. “Social Forces”, 86(1), 313-334.
  11. Jump up^ Brandon, E. “Why Older Workers Can’t get Hired.” http://money.usnews.com/money/blogs/planning-to-retire/2012/05/18/why-older-workers-cant-get-hired
  12. Jump up^ Cohen, Aaron M. “Wiring the Elderly.” Futurist. 2010.
  13. Jump up to:a b c “Unique Training Requirements of Low-Income, Older Workers.” U.S. Department of Labor.2010 7 Jan. http://www.doleta.gov/Seniors/html_docs/docs/unique1.cfm. 1 Dec. 2011.
  14. Jump up^ “Instructional Styles, Attitudes And Experiences Of Seniors In Computer Workshops” Educational Gerontology.2010.
  • Butler, T., & Berret, B. (2011). A generation lost: the reality of age discrimination in today’s hiring practices. Journal of Management and Marketing Research, 9, 1-11. Academic Search Complete. Web. 21 Sept. 2013.

https://en.wikipedia.org/wiki/Age_discrimination_in_the_United_States

Story 2: 2 Out of 3 Americans Are Overweight or Obese — President Trump Joins The Huge Fluffy Majority — Videos

See the source image

See the source image

Overweight World – Obesity Facts and Statistics

What is obesity? – Mia Nacamulli

Obesity in America

Normal Weight, Yet Still Obese?

Top 10 FATTEST COUNTRIES in the World

Fluffy on British People

“The President” – Gabriel Iglesias (from my I’m Not Fat… I’m Fluffy comedy special)

“Road Trip” – Gabriel Iglesias- (From Hot & Fluffy comedy special)

The Best Time to Eat to Lose Weight

Keto and Intermittent Fasting: the Big Overview for Beginners

Acceptable Liquids with Intermittent Fasting

The Ketogenic Diet & Dairy (Milk, Yogurt & Cheese)

What Are The 4 Body Types?

Body Type l What Is My Shape l How to Find Your Body Type l Mesomorph l Take the Quiz

What to Eat for Your Body Type?

Adrenal Body Type, Cortisol & Belly Fat!

How to Lose Belly Fat: FAST!

The Fastest Way to Lose Weight: MUST WATCH!

Rid the Loose Flabby Skin!

The 2 Most DANGEROUS Foods: MUST WATCH!

The 7 Foods You Must NEVER Ever Eat!

The Perfect Diet

Gabriel Iglesias I’m Sorry for What I Said When I Was Hungry 2017 (Stand Up Comedy, with SUBTITLES)

Story 3: President Trump’s Fake News Awards of 2017 — Big Lie Media’s Junk Journalism Progressive Propaganda Exposed — Videos

See the source image

Trump’s ‘Fake News’ award winners are …

Two of Trump fake news award winners are financial stories

Michelle Malkin and Joe Concha react to ‘Fake News Awards’

FULL VIDEO Of President Trump’s Fake News Awards

Fake News Awards & TRUMP PRESS CONFERENCE Rebutting CNN, MSNBC, ABC, New York Times, etc…

The Fake News Awards 2017

#Trump Gaslights and Psychs Out the #MSM Yet Again and They Took the Bait Hook, Line and Sinker

 

The Highly-Anticipated 2017 Fake News Awards

TEAM GOP – January 17, 2018

2017 was a year of unrelenting bias, unfair news coverage, and even downright fake news. Studies have shown that over 90% of the media’s coverage of President Trump is negative.

Below are the winners of the 2017 Fake News Awards.

1. The New York Times’ Paul Krugman claimed on the day of President Trump’s historic, landslide victory that the economy would never recover.


2. ABC News’ Brian Ross CHOKES and sends markets in a downward spiral with false report.



3. CNN FALSELY reported that candidate Donald Trump and his son Donald J. Trump, Jr. had access to hacked documents from WikiLeaks.


(via Fox News)
4. TIME FALSELY reported that President Trump removed a bust of Martin Luther King, Jr. from the Oval Office.


5. Washington Post FALSELY reported the President’s massive sold-out rally in Pensacola, Florida was empty. Dishonest reporter showed picture of empty arena HOURS before crowd started pouring in.

View image on TwitterView image on TwitterView image on TwitterView image on Twitter

.@DaveWeigel @WashingtonPost put out a phony photo of an empty arena hours before I arrived @ the venue, w/ thousands of people outside, on their way in. Real photos now shown as I spoke. Packed house, many people unable to get in. Demand apology & retraction from FAKE NEWS WaPo!

6. CNN FALSELY edited a video to make it appear President Trump defiantly overfed fish during a visit with the Japanese prime minister. Japanese prime minister actually led the way with the feeding.


7. CNN FALSELY reported about Anthony Scaramucci’s meeting with a Russian, but retracted it due to a “significant breakdown in process.”


(via washingtonpost.com)
8. Newsweek FALSELY reported that Polish First Lady Agata Kornhauser-Duda did not shake President Trump’s hand.


9. CNN FALSELY reported that former FBI Director James Comey would dispute President Trump’s claim that he was told he is not under investigation.


10. The New York Times FALSELY claimed on the front page that the Trump administration had hidden a climate report.


(via WashingtonPost.com)

11. And last, but not least: “RUSSIA COLLUSION!” Russian collusion is perhaps the greatest hoax perpetrated on the American people. THERE IS NO COLLUSION!

Well, now that collusion with Russia is proving to be a total hoax and the only collusion is with Hillary Clinton and the FBI/Russia, the Fake News Media (Mainstream) and this phony new book are hitting out at every new front imaginable. They should try winning an election. Sad!

 

While the media spent 90% of the time focused on negative coverage or fake news, the President has been getting results:

1. The economy has created nearly 2 million jobs and gained over $8 trillion in wealth since the President’s inauguration.

2. African Americans and Hispanics are enjoying the lowest unemployment rate in recorded history.

3. The President signed historic tax cuts and relief for hardworking Americans not seen since President Reagan.

4. President Trump’s plan to cut regulations has exceeded “2 out for every 1 in” mandate, issuing 22 deregulatory actions for every one new regulatory action.

5. The President has unleashed an American energy boom by ending Obama-era regulations, approving the Keystone pipeline, auctioning off millions of new acres for energy exploration, and opening up ANWR.

6. ISIS is in retreat, having been crushed in Iraq and Syria.

7. President Trump followed through on his promise to recognize Jerusalem as the capital of the State of Israel and instructed the State Department to begin to relocate the Embassy.

8. With President Trump’s encouragement, more member nations are paying their fair share for the common defense in the NATO alliance.

9. Signed the Veterans Accountability and Whistleblower Protection Act to allow senior officials in the VA to fire failing employees and establishes safeguards to protect whistleblowers.

10. President Trump kept his promise and appointed Associate Justice Neil Gorsuch to the U.S. Supreme Court.

https://gop.com/the-highly-anticipated-2017-fake-news-awards/

 

A Times Square billboard that “The Late Show With Stephen Colbert” bought to nominate itself for President Trump’s “Fake News Awards.” CreditMike Segar/Reuters

WASHINGTON — President Trump — who gleefully questioned President Barack Obama’s birthplace for years without evidence, long insisted on the guilt of the Central Park Five despite exonerating proof and claimed that millions of illegal ballots cost him the popular vote in 2016 — wanted to have a word with the American public about accuracy in reporting.

On Wednesday, after weeks of shifting deadlines, and cryptic clues, Mr. Trump released his long-promised “Fake News Awards,” an anti-media project that had alarmed advocates of press freedom and heartened his political base.

“And the FAKE NEWS winners are …,” he wrote on Twitter at 8 p.m.

The message linked, at first, to a malfunctioning page on GOP.com, the Republican National Committee website. An error screen read: “The site is temporarily offline, we are working to bring it back up. Please try back later.”

When the page came back online less than an hour later, it resembled a Republican Party news release. Headlined “The Highly Anticipated 2017 Fake News Awards” and attributed to “Team GOP,” it included a list of Trump administration accomplishments and jabs at news organizations presented in the form of an 11-point list.

The “winners” were CNN, mentioned four times; The New York Times, with two mentions; and ABC, The Washington Post, Time and Newsweek, with one mention apiece.

Taken as a whole, Mr. Trump’s examples of grievances came as no surprise to anyone who has read his complaints about the media on Twitter.

The various reports singled out by Mr. Trump touched on serious issues, like the media’s handling of the investigation by the special counsel Robert S. Mueller III into the Trump campaign’s possible ties to Russia, and frivolous matters, like the manner in which journalists conveyed how the president fed fish during a stop at a koi pond on his visit to Japan.

The first item on the list referred not to a news article but to a short opinion piece posted on The Times’s website at 12:42 on the night Mr. Trump became president: “The New York Times’ Paul Krugman claimed on the day of President Trump’s historic, landslide victory that the economy will ‘never’ recover,” the entry read.

What Mr. Krugman actually wrote was this: “If the question is when markets will recover, a first-pass answer is never.” Mr. Krugman concluded his election night take by predicting that a global recession was likely, while adding the caveat, “I suppose we could get lucky somehow.”

Three days later, Mr. Krugman retracted his prediction of an economic collapse, saying he overreacted.

The next target was Brian Ross of ABC News, who was suspended by the network last month because of an erroneous report.

Photo

President Trump’s tweet linked, at first, to a malfunctioning page on GOP.com, the Republican National Committee website.

ABC apologized for and corrected Mr. Ross’s report that Michael T. Flynn, the former national security adviser, planned to testify that Mr. Trump had directed him to make contact with Russian officials when Mr. Trump was still a candidate.

In fact, Mr. Trump had directed Mr. Flynn to make contact after the election, when he was president-elect.

At the time of Mr. Ross’s suspension, Kathleen Culver, the director of the Center for Journalism Ethics at the University of Wisconsin-Madison, said that the president was likely to use the mistake as ammunition against his political opponents — an observation that seemed borne out by the “Fake News Awards.”

The third entry on the GOP.com list went after CNN, a favorite target of the president, for reporting incorrectly last month that the president’s eldest child, Donald Trump Jr., had received advance notice from WikiLeaks about a trove of hacked documents that it planned to release during last year’s presidential campaign.

In fact, the email to the younger Mr. Trump was sent a day after the documents, stolen from the Democratic National Committee, were made available to the general public. The correction undercut the main thrust of CNN’s story, which had been seized on by critics of the president as evidence of coordination between WikiLeaks and the Trump campaign.

Another entry on the list took on The Washington Post, claiming that it had “FALSELY reported the President’s massive sold-out rally in Pensacola, Florida was empty. Dishonest reporter showed picture of empty arena HOURS before crowd started pouring in.”

The reporter in question was David Weigel, who had posted the photo in question on his Twitter account before quickly deleting it. The Post itself did not publish the photo or a report on the size of the crowd at the Trump event. The “Fake News Awards” entry, however, conflated a reporter’s tweetwith the publication itself. It also omitted the fact that Mr. Weigel deleted his tweet and apologized for it when it was pointed out to him that it was misleading. Further, it did not mention that Mr. Trump had called for Mr. Weigel to be fired over the tweet. (He was not.)

The content of the 11-point list was perhaps less notable than its premise: a sitting president using his bully pulpit for a semi-formalized attack on the free press.

In two subsequent tweets on Wednesday night, Mr. Trump added that there were “many great reporters I respect” and defended his administration’s record in the face of “a very biased media.”

The technical anticlimax seemed a fitting end to a peculiar saga that began in November when Mr. Trump floated the bestowing of a “FAKE NEWS TROPHY.”

The idea matured into the “Fake News Awards,” which the president initially said in a Jan. 2 Twitter post he would give out on Jan. 8 to honor “the most corrupt & biased of the Mainstream Media.”

With the date approaching, Mr. Trump wrote on Twitter that the event would be moved to Wednesday because “the interest in, and importance of, these awards is far greater than anyone could have anticipated!”

Photo

Sarah Huckabee Sanders, the White House secretary, on Wednesday, hours before the awards were announced. “I know you’re all waiting to see if you are big winners, I’m sure,” she told reporters. CreditDoug Mills/The New York Times

From the beginning, the awards were the sort of Trumpian production that seemed easy to mock but difficult to ignore. Members of the news media joked about the speeches they would prepare, the tuxedos and gowns they would fetch. It would be an honor, they said, just to be nominated.

Here, it seemed, was the opéra bouffe climax of Mr. Trump’s campaign against the media, a bizarro-world spectacle that both encapsulated and parodied the president’s animus toward a major democratic institution.

Late-night comedy shows created satirical Emmys-style advertising campaigns to snag what some referred to as a coveted “Fakey.”

“The Late Show With Stephen Colbert” bought a billboard in Times Square, nominating itself in categories like “Least Breitbarty” and “Corruptest Fakeness.” Jimmy Kimmel, who has emerged as a Trump bête noire, called it “the Stupid People’s Choice Awards.”

Politico reported that the awards could even pose an ethical issue for White House aides, with some experts arguing that the event would breach a ban on government officials using their office to explicitly promote or deride private organizations.

And press advocates cringed at the prospect of a gala dedicated to the phrase “fake news,” which has already helped corrode trust in journalism in the United States and around the world. In response to Mr. Trump’s endeavor, the Committee to Protect Journalists this month recognized the president among the “world leaders who have gone out of their way to attack the press and undermine the norms that support freedom of the media.”

Two Republicans from Arizona, Senator John McCain and Senator Jeff Flake, denounced Mr. Trump’s anti-press attacks, with Mr. Flake noting in a speech on the Senate floor on Wednesday that the president had borrowed a term from Stalin to describe the media: “enemy of the people.”

The buzz around the president’s latest anti-press stunt has contributed to a larger shift in American attitudes toward the press.

In a study released this week by Gallup and the Knight Foundation, 66 percent of Americans who were surveyed said most news organizations blurred opinion and fact, up from 42 percent in 1984. “Fake news” was deemed a threat to democracy by a majority of respondents.

Mr. Trump’s list did not mention BuzzFeed, a media outlet that drew his ire last year when it published a salacious and largely unsubstantiated intelligence dossier that purported to lay out how Russia had aided the Trump campaign. On Jan. 8, President Trump’s longtime lawyer, Michael D. Cohen, filed a defamation lawsuit in federal court against Fusion GPS, the firm behind the report, as well as a separate lawsuit against BuzzFeed in state court.

Mr. Trump also did not mention Michael Wolff, the author of the slashing, if error-specked, best seller, “Fire and Fury: Inside the Trump White House,” although a lawyer working on his behalf had sent a letter demanding that the publisher Henry Holt and Company halt publication of the book.

“Fire and Fury” did not come out until Jan. 5, so perhaps the author will receive a prominent mention next January, if the president sees fit to give out the 2018 Fake News Awards.

The Pronk Pops Show Podcasts Portfolio

 

Listen To Pronk Pops Podcast or Download Shows 1017-1018

Listen To Pronk Pops Podcast or Download Shows 1010-1016

Listen To Pronk Pops Podcast or Download Shows 1001-1009

Listen To Pronk Pops Podcast or Download Shows 993-1000

Listen To Pronk Pops Podcast or Download Shows 984-992

Listen To Pronk Pops Podcast or Download Shows 977-983

Listen To Pronk Pops Podcast or Download Shows 970-976

Listen To Pronk Pops Podcast or Download Shows 963-969

Listen To Pronk Pops Podcast or Download Shows 955-962

Listen To Pronk Pops Podcast or Download Shows 946-954

Listen To Pronk Pops Podcast or Download Shows 938-945

Listen To Pronk Pops Podcast or Download Shows 926-937

Listen To Pronk Pops Podcast or Download Shows 916-925

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows 151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 853, March 8, 2017, Story 1: Republicans United For Clean Repeal of Obamacare and Divided On Obamacare Replacement — Conservatives, Classical Liberals and Libertarians Oppose House Rollover Republican Ryancare — CATO Institute, Club for Growth, Freedom Works Heritage Foundation and House Freedom Caucus, Republican Study Committee and American People All Oppose Obamacare 2.0 Lite — Support Senator Rand Paul’s Bill and Freedom Caucus — Negotiate — Negotiate — Negotiate — Videos — Story 2: Wikileaks Vault 7 Release Reveals CIA’s Collection of Hacking Tools and Malware of Secret Surveillance Spying Security State (S5) — Intelligence Community Are Listening and Watching — George Orwell Was An Optimist — Two Party Turnkey Tyranny — Videos -_

Posted on March 8, 2017. Filed under: Addiction, American History, Animal, Benghazi, Blogroll, Breaking News, Communications, Congress, Constitutional Law, Corruption, Countries, Culture, Defense Spending, Donald J. Trump, Donald Trump, Elections, Fast and Furious, Government, Government Dependency, Government Spending, Hate Speech, Health, Health Care, Health Care Insurance, Hillary Clinton, History, House of Representatives, Human Behavior, Illegal Immigration, Illegal Immigration, Immigration, Independence, Iran Nuclear Weapons Deal, Islam, Law, Legal Immigration, Life, Lying, Medicare, Obama, Philosophy, Photos, Politics, Polls, Progressives, Rand Paul, Raymond Thomas Pronk, Religion, Scandals, Science, Security, Senate, Social Science, Social Security, Socials Security, Spying, Taxation, Taxes, Terror, Terrorism, Unemployment, Videos, Violence, War, Wealth, Weather, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Pronk Pops Show 812: December 12, 2016

Pronk Pops Show 811: December 9, 2016

Pronk Pops Show 810: December 8, 2016

Pronk Pops Show 809: December 7, 2016

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

 

Story 1: Republicans United For Clean Repeal of Obamacare and Divided On Obamacare Replacement — Conservatives, Classical Liberals and Libertarians Oppose House Rollover Republican Ryancare — CATO Institute, Club for Growth, Freedom Works Heritage Foundation and House Freedom Caucus,  Republican Study Committee and American People  All Oppose Obamacare 2.0 Lite — Support Senator Rand Paul’s Bill and Freedom Caucus — Negotiate — Negotiate — Negotiate — Videos — 

Image result for cartoons on repeal and repace obamacare

Image result for cartoon branco republican repeal and replace obamacare

Image result for vault 7 cia

Image result for cartoons on obamacare

Conservative Freedom Caucus Torpedoes GOP Obamacare Replacement

MAJOR: Paul Ryan Introduces American Health Care Act, House GOP’s Obamacare Replacement

SABOTAGE! WHAT PAUL RYAN JUST DID TO TRUMPCARE PROVES HE’S A TRAITOR TO THE PRESIDENT

Speaker Paul Ryan: There isn’t chaos in GOP-led Congress

SEAN HANNITY INTERVIEWS TOM PRICE ABOUT TRUMP’S NEW HEALTHCARE PLAN – 3/7/17

Trump’s HHS Secretary On Obamacare Replacement Bill

Ingraham takes issue with GOP’s health care replacement bill

Herman Cain on Obamacare replacement bill: Consumers now back in charge

Laffer: Obamacare replacement bill worth 2,000-3,000 points on the Dow

President Trump Holds Meeting On Obamacare Replacement with House Deputy Whip Team 3/7/17

GOP releases Obamacare replacement details

York: Fate of GOP health care bill lies with Freedom Caucus

Republicans unveil Obamacare replacement

Trump backs healthcare tax credit amid conservative opposition

Sen. Rand Paul unveils ObamaCare replacement plan

Conservatives lash out at House GOP’s Obamacare replacement bill

March 7 at 3:01 PM
Influential conservative lawmakers and activist groups panned health-care legislation drafted by House Republican leaders Tuesday, throwing the GOP’s plan to undo the Affordable Care Act in serious doubt less than 24 hours after it was released.Those groups dubbed the House bill, backed by House Speaker Paul D. Ryan (R-Wis.), as “Obamacare Lite,” “RyanCare” or “RINOcare” — a reference to “Republican in name only,” a popular conservative epithet for establishment politicians.The Ryan-backed bill offers a more conservative vision for the nation’s health-care system, replacing federal insurance subsidies with a new form of individual tax credits and phasing out most of the ACA’s taxes. But key lawmakers and outside groups, who can rile up the party’s base against legislative plans, said the legislation does not go far enough in pulling back elements of President Barack Obama’s overhaul.“The House Republican proposal released last night not only accepts the flawed progressive premises of Obamacare but expands upon them,” Michael Needham, the head of Heritage Action for America, said in a statement Tuesday. “Congressional Republicans should fully repeal the failed law and begin a genuine effort to deliver on longstanding campaign promises that create a free market health care system.”Two other groups, FreedomWorks and the Club for Growth, decried the plans Tuesday as a betrayal of campaign promises.

A day after House Republicans released a plan to supplant the Affordable Care Act, Sen. Rand Paul (R-Ky.) outlined the issues he has with their proposal, indicating it might be unconstitutional. (Alice Li, Jayne Orenstein/The Washington Post)

“If this warmed-over substitute for government-run health care remains unchanged, the Club for Growth will key vote against it,” said the group’s president, David McIntosh, referring to a process in which lawmakers are graded on their votes, the better to use them as ammunition on the campaign trail.

The dilemma Republican congressional leaders face is, if they change the legislation to appease hard-line conservatives, they are likely to alienate more-moderate members who are wary of disrupting insurance markets and taking coverage away from those who gained it under the ACA.

The margin for dissent is slim: Assuming no Democrats break ranks to support the bill, for the overhaul to pass, Republicans can lose only 21 votes in the House and two votes in the Senate.

CONTENT FROM WELLS FARGO ADVISORS
Keep these factors in mind when planning for retirement
Understanding the risks that can come between you and the retirement you want is an important step toward meeting your goals.

Four key Republicans in the Senate have expressed worries about the plan’s possible impact on lower-income people who received Medicaid coverage through the ACA’s expansion of that program. The four senators are split on exactly what proposals would meet their standards, but none are likely to support the course of action favored by many conservatives — passing a 2015 bill that repealed key ACA provisions without immediately including replacement provisions.

There were some signs of hope for the House plan Tuesday. President Trump offered an early boost to GOP leaders with a morning tweet: “Our wonderful new Healthcare Bill is now out for review and negotiation. ObamaCare is a complete and total disaster — is imploding fast!”

Vice President Pence attended a Senate Republican policy luncheon Tuesday and, in a break with normal practice, joined Senate Majority Leader Mitch McConnell and other GOP leaders at a news conference afterward to defend the House approach as “the framework for reform.”

“We are certainly open to improvements and recommendations in the legislative process, but this is the bill, and the president supports the American Health Care Act,” he said. “We are looking forward to working very directly with leadership in the House and the Senate in the weeks ahead. We are very confident that the American Health Care Act, with their help, will be on the president’s desk.”

In another sign of the administration’s support, Health and Human Services Secretary Tom Price sent a letter Tuesday to the chairmen of the two House committees processing the legislation, calling it a “necessary and important first step toward fulfilling our promises to the American people.”

But Price, who authored a similar ACA replacement proposal when he served in the House, said that achieving all of Trump’s health-care goals “will require more than what is possible” in the current legislation, which is limited in its scope to take advantage of special budget rules allowing for easier Senate passage.

He specifically mentioned allowing insurance to be sold across state lines, pharmaceutical cost reductions and “medical legal reforms,” an apparent reference to long-standing GOP proposals to limit malpractice liability.

Senate Majority Leader Mitch McConnell (R-Ky.) offered measured support for the proposed legislation and said he would bring it to the Senate floor should it pass the House.

“I encourage every member to review [the legislation] because I hope to call it up when we receive it from the House,” McConnell said Tuesday on the Senate floor. “We’ve come a long way. We’ve got a lot further to go, but we’re making significant progress. Working arm in arm with the House and the new administration, we’re going to keep our promise to the American people.”

While some of the fiercest criticism came from hard-right activist groups that have dogged Republican congressional leaders for years, other more establishment-minded organs joined the chorus of dissent.

National Review published an editorial Tuesday that said the legislation was “a disappointment” and has “serious flaws even as a first step toward full repeal and replacement.”

Republicans, the influential conservative magazine said, “would be better off rallying behind a bill in which they really believe, even if Democrats kill it with a filibuster,than trying and failing to enact a bill that they support only tepidly.”

Leaders involved in drafting the bills sought to defend their plan against the onslaught of criticism, describing it as the product of months of internal discussions and saying its details could still change.

“We now have a bill that’s available for all to read,” said Rep. Greg Walden (R-Ore.), chairman of the House Energy and Commerce Committee, which helped craft one of them, at a news conference Tuesday. “I’d encourage them to do it. I’d encourage them to look against their own bills and what they’ve supported in the past. And then let’s have a thoughtful legislative discussion.”

Rep. Kevin Brady (R-Tex.), chairman of the House Ways and Means Committee, which produced the other bill, said: “As Republicans, we have a choice. We can act now, or we can keep fiddling around and squander this opportunity to repeal Obamacare and begin a new chapter of freedom for the American people. House Republicans are choosing to act now.”

Still, agitation among conservatives was evident Monday night and poured into Tuesday.

CONTENT FROM WELLS FARGO ADVISORS
Keep these factors in mind when planning for retirement
Understanding the risks that can come between you and the retirement you want is an important step toward meeting your goals.

“Keep the ‘Cadillac’ tax in place? Keep Medicaid in place until 2020?” said Rep. Jim Jordan (R-Ohio), a co-founder of the House Freedom Caucus, referring to high-priced health-care plans. “We didn’t have Medicaid expansion in the bill we sent to President Obama, but we have it in the one we send to President Trump? That makes no sense to me.”

“Obamacare 2.0,” tweeted Rep. Justin Amash (R-Mich.), a libertarian who frequently breaks with GOP leadership.

Under two bills drafted by separate House committees, the government would no longer penalize Americans for failing to have health insurance but would try to encourage people to maintain coverage by allowing insurers to impose a 30 percent surcharge for those who do not have continuous coverage.

The legislation would preserve two of the most popular features of the 2010 health-care law, letting young adults stay on their parents’ health plans until age 26 and forbidding insurers to deny coverage or charge more to people with preexisting medical problems. It would also target Planned Parenthood, rendering the women’s health organization ineligible for Medicaid reimbursements or federal family -planning grants — a key priority for antiabortion groups.

Taken together, the bills introduced Monday represent the Republicans’ first attempt — and best shot to date, with an ally in the White House — to translate into action seven years of talking points about demolishing the ACA.

At the same time, major aspects of the House GOP plan reflect the treacherous terrain that Republicans face to win enough votes within their own conferences in the GOP-controlled House and Senate.

The bills must address concerns of both conservatives worried about the plan’s cost and the notion it might enshrine a new federal entitlement, as well as more moderate members who want to ensure that their constituents, including those who received coverage under the ACA’s Medicaid expansion, retain access to affordable health care.

The Freedom Caucus, a block of roughly 30 House hard-liners who criticized earlier versions of the bill, is set to meet Tuesday night to discuss the health-care bill and perhaps develop a list of demands to present to GOP leaders.

Members of the Republican Study Committee, a larger conservative group, were already critical of key elements of the plan. “This is a Republican welfare entitlement,” reads an RSC analysis distributed late Monday, addressing the inclusion of refundable tax credits in the plan.

With no Democrats expected to vote to pass the bill and four House GOP seats vacant, Republicans can afford to lose no more than 21 members in the lower chamber.

In recognition of the close vote that is expected, House Majority Whip Steve Scalise (R-La.) and several deputy whips are expected to visit the White House Tuesday afternoon to discuss the health-care bill with Trump administration officials.

On Tuesday morning, Trump signaled the work on the proposal was not completely finished, referring to selling insurance across state lines and saying that change would come in “phase 2 & 3 of healthcare rollout.” The president also said he was “working on new system where there will be competition in the Drug Industry” that will lead prices to “come way down.”

Conservative critics of the measure had noted the plan’s exclusion of selling insurance across state lines. “The problems with this bill are not just what’s in it, but also what’s missing,” said McIntosh.

Yet attacks from the right were not the only challenge facing Republican leaders.

Four key Republican senators, all from states that opted to expand Medicaid under the ACA, said they would oppose any new plan that would leave millions of Americans uninsured.

“We will not support a plan that does not include stability for Medicaid expansion populations or flexibility for states,” Sens. Rob Portman (Ohio), Shelley Moore Capito (W.Va.), Cory Gardner (Colo.) and Lisa Murkowski (Alaska) wrote in a letter to McConnell on Monday.

The plan from House Republicans would substantially redesign Medicaid with the goal of balancing the GOP’s antipathy toward the ACA’s expansion of the program against the concerns of a significant cadre of Republican governors — and the lawmakers from their states — who fear losing millions of dollars that the law has funneled to help insure low-income residents.

Democrats, meanwhile, have given no indication that they intend to work with Republicans, and top party leaders decried the GOP plan Monday as a betrayal of everyday Americans. “Trumpcare doesn’t replace the Affordable Care Act, it forces millions of Americans to pay more for less care,” said Senate Minority Leader Charles E. Schumer (D-N.Y.).

In particular, the plan to target Planned Parenthood has already generated fierce pushback from Democrats and doubts from some Republicans who have noted that federal funds are already barred from funding abortions and that Planned Parenthood provides routine medical care to millions of American women.

https://www.washingtonpost.com/powerpost/house-leaders-brace-for-the-task-ahead-selling-obamacare-lite/2017/03/07/ab2f721e-02e5-11e7-ad5b-d22680e18d10_story.html?utm_term=.b64bbc38491c

A Disappointing Start

by THE EDITORS March 7, 2017 12:45 PM We believe that Obamacare should be repealed and replaced with policies that enable Americans to make their own decisions about what sort of health insurance to

We believe that Obamacare should be repealed and replaced with policies that enable Americans to make their own decisions about what sort of health insurance to buy, and that their options should include low-premium coverage that protects them against the risk of major financial setbacks resulting from health care. The legislation released last night by House Republicans is, even on the most charitable reading, only a first step toward that goal.

It does not repeal all of Obamacare, leaving many of its regulations in place. The apparent rationale for this omission is that eliminating the regulations would subject the legislation to a fatal Senate filibuster. We have recommended that Republicans defang the regulations by replacing Obamacare’s subsidies with a simple new tax credit that people could use to buy insurance governed by a new, lighter regulatory regime. That way Obamacare’s regulations would stay on the books but no longer hinder consumer choice. But Republicans shrank from this option, too.

We disagree with this tactical decision, which places Senate parliamentary rules — or, rather, places guesses about how those rules would operate — ahead of good health policy and making good on longstanding party promises. It also seems to us that Republicans would be better off rallying behind a bill in which they really believe, even if Democrats kill it with a filibuster, than trying and failing to enact a bill that they support only tepidly. That second outcome may now take place.

Moreover, the legislation has some serious flaws even as a first step toward full repeal and replacement. It eliminates Obamacare’s fines on people who go without insurance, but in their place creates a new surcharge for people who let their insurance lapse and then try to purchase a new policy. The goal is to keep healthy people from leaving the insurance rolls and thus destabilizing insurance markets.

The surcharge is a heavy-handed instrument: Insurers would be obligated to impose it regardless of their preferences. Yet the surcharge might not achieve its goal. A lot of healthy people might well decide to go without insurance and run the risk of paying a surcharge if they get sick later. The surcharge even undermines its own goal, since it would discourage healthy people who had already left the insurance rolls from getting back on them.

The bill has its good points. If the surcharge works, the deregulation in the bill would lower premiums. Many of Obamacare’s taxes would be repealed. Obamacare’s tax credits create high effective marginal tax rates for people in the lower middle class; the bill’s replacement tax credits would avoid this problem. Permissible contributions to and limits on health savings accounts would be loosened. Federal contributions to Medicaid would be capped, ending the perverse incentives that have for decades enabled the growth of the program. All in all, though, the bill is a disappointment. And it is not too late to get a second opinion.

All in all, though, the bill is a disappointment. And it is not too late to get a second opinion.

 http://www.nationalreview.com/article/445558/obamacare-replacement-republican-plan-house-representatives-disappointing

Story 2: Wikileaks Vault 7 Release Reveals CIA’s Collection of Hacking Tools and Malware of Secret Surveillance Spying Security State (S5) — Intelligence Community Are Listening and Watching — George Orwell Was An Optimist — Two Party Turnkey Tyranny — Videos — 

Image result for vault 7 cia

Image result for vault 7 cia

Image result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotes

Image result for george orwell quotesImage result for george orwell quotes

Image result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotes

Image result for george orwell quotes

Ari Fleischer on CIA leaks, wiretapping claims

Wikileaks Claims CIA Is Hacking Americans’ Electronics – Tucker Carlson Tonight – Fox News – 3/7/17

Wikileaks dumps information claiming proof of CIA hacking

What Pisses Me Off About Wikileaks Vault 7 Release

‘Cyber warfare is a new frontline’: CIA created malware designed to penetrate software – WikiLeaks

VAULT 7: CIA Staged Fake Russian Hacking to Set Up Trump — Russian Cyber-Attack M.O. As False Flag

Former CIA Director: Wikileaks Dump Could Be ‘Very Damaging’ | Andrea Mitchell | MSNBC

On the Russia Lunacy & Wikileaks BOMBSHELL Leak of CIA Hacking Force

Wikileaks Vault 7: A Massive and Confusing Revelation

WikiLeaks UNLEASHES ‘Year Zero’ CIA Hacking Tools (Vault 7)

WIKILEAKS VAULT 7: The C.I.A. Is Listening Via Everything

Inside Vault 7: CIA Hacking Tools Published by Wikileaks

George Orwell 1984 Telescreen Exercise

Nineteen Eighty-Four (1984) – Last Scene

ANIMAL FARM – full movie

1984 George Orwell – Full Movie – Hollywood best Greatest blockbuster movie Film

Watch Nineteen Eighty Four Watch Movies Online Free

George Orwell: A Life in Pictures Full Documentary (High Quality)

A Final Warning from George Orwell

Wikileaks Unveils ‘Vault 7’: “The Largest Ever Publication Of Confidential CIA Documents”; Another Snowden Emerges

Tyler Durden's picture

TwitterFacebookReddit

WikiLeaks has published what it claims is the largest ever release of confidential documents on the CIA. It includes more than 8,000 documents as part of ‘Vault 7’, a series of leaks on the agency, which have allegedly emerged from the CIA’s Center For Cyber Intelligence in Langley, and which can be seen on the org chart below, which Wikileaks also released:

A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”

WikiLeaks tweeted the leak, which it claims came from a network inside the CIA’s Center for Cyber Intelligence in Langley, Virginia.

Among the more notable disclosures which, if confirmed, “would rock the technology world“, the CIA had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”

Another profound revelation is that the CIA can engage in “false flag” cyberattacks which portray Russia as the assailant. Discussing the CIA’s Remote Devices Branch’s UMBRAGE group, Wikileaks’ source notes that it “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”

As Kim Dotcom summarizes this finding, “CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE

CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE

But perhaps what is most notable is the purported emergence of another Snowden-type whistleblower: the source of the information told WikiLeaks in a statement that they wish to initiate a public debate about the “security, creation, use, proliferation and democratic control of cyberweapons.”  Policy questions that should be debated in public include “whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency,” WikiLeaks claims the source said.

The FAQ section of the release, shown below, provides further details on the extent of the leak, which was “obtained recently and covers through 2016”. The time period covered in the latest leak is between the years 2013 and 2016, according to the CIA timestamps on the documents themselves. Secondly, WikiLeaks has asserted that it has not mined the entire leak and has only verified it, asking that journalists and activists do the leg work.

Among the various techniques profiled by WikiLeaks is “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As Kim Dotcom chimed in on Twitter, “CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones” and added ” CIA turned every Microsoft Windows PC in the world into spyware. Can activate backdoors on demand, including via Windows update”

BREAKING: CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones.

Dotcom also added that “Obama accused Russia of cyberattacks while his CIA turned all internet enabled consumer electronics in Russia into listening devices. Wow!”

Obama accused Russia of cyberattacks while his CIA turned all internet enabled consumer electronics in Russia into listening devices. Wow!

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Key Highlights from the Vault 7 release so far:

  • “Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.
  • Wikileaks claims that the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
  • By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook.
  • The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.
  • Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Snowden 2.0?

  • In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

CIA targets iPhones, Androids, smart TVs:

  • CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).
  • The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

Also cars, suggesting that the CIA may have a role in the death of Michael Hastings:

  • As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks.
  • The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

And computers:

  • The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Hoarding of Zero Day exploits:

  • In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.
  • Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

Proliferation of leaked/hacked Cyberwar programs:

  • While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain. Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.
  • Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.
  • Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

The U.S. Consulate in Frankfurt is a covert CIA hacker base

  • In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa. CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover.
  • The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Examples of CIA projects

  • The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools. The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.
  • Umbrage: The CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation. With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.
  • Fine Dining:  Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations.  Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals.
  • ‘Improvise’; a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor).
  • HIVE: HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants. The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

And some key sections from the FAQ:

  • What time period is covered? The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first). WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.
  • What is “Vault 7” “Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.
  • What is the total size of “Vault 7”? The series is the largest intelligence publication in history.
  • When was each part of “Vault 7” obtained?: Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.
  • Is each part of “Vault 7” from a different source? Details on the other parts will be available at the time of publication.
  • How did WikiLeaks obtain each part of “Vault 7”? Sources trust WikiLeaks to not reveal information that might help identify them.
  • Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series? No. That would be certainly counter-productive.

* * *

PREVIOUSLY

As a reminder, last night Wikileaks announced that it has released an encrypted torrent file which reportedly contains information on the mysterious “Vault 7”, and which we now know is the biggest “collection of material about CIA activities obtained by WikiLeaks.publication in history.” It can be downloaded now at the following URL, and accessed using the password “SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds”

Wikileaks had previously announced that it would hold an 8am Eastern press conference, as part of the unveiling.

ANNOUNCE: WikiLeaks press conference in under five hours at 8am ET / 1pm UTC / 14:00 CET. Streamed live.

However, there appeared to have been some complications, with Wikileaks tweeting that “the press conference is under attack: Facebook+Periscope video used by WikiLeaks’ editor Julian Assange have been attacked. Activating contingency plans”

Press conf under attack: Facebook+Periscope video used by WikiLeaks’ editor Julian Assange have been attacked. Activating contingency (1/2)

Wikileaks then announced that “As Mr. Assange’s Perscipe+Facebook video stream links are under attack his video press conference will be rescheduled.”

NOTICE: As Mr. Assange’s Perscipe+Facebook video stream links are under attack his video press conference will be rescheduled.

In a separate tweet, Wikileaks has just released the passphrase to decrypt the torrent file: RELEASE: CIA Vault 7 Year Zero decryption passphrase:

SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds

RELEASE: CIA Vault 7 Year Zero decryption passphrase:

SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds

As a result, since Assange appears to have been unable to launch his previously scheduled press conference, he has gone ahead and issued the press release on Vault 7 Part 1 “Year Zero, which is titled: Inside the CIA’s global hacking force:

Press Release

Vault 7: CIA Hacking Tools Revealed

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

* * *

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

http://www.zerohedge.com/news/2017-03-07/wikileaks-hold-press-conference-vault-7-release-8am-eastern

WikiLeaks Posts Thousands of Purported CIA Cyberhacking Documents

Records show CIA able to spy on smartphones, internet TVs

WikiLeaks released thousands of documents and files Tuesday that it said exposed hacking tools the Central Intelligence Agency uses.

WikiLeaks released thousands of documents and files Tuesday that it said exposed hacking tools the Central Intelligence Agency uses.PHOTO: LARRY DOWNING/REUTERS

WASHINGTON—WikiLeaks released thousands of documents and files Tuesday that it said exposed tools the Central Intelligence Agency uses to hack smartphones, computer operating systems, messenger applications and internet-connected televisions.

The unauthorized disclosure—the first part of which WikiLeaks said consisted of 8,761 documents and files from the CIA’s Center for Cyber Intelligence—confronts President Donald Trump with a threat from the very organization that leaked documents on his opponent, Democrat Hillary Clinton, during the 2016 presidential campaign.

WikiLeaks named the series of files “Vault 7” and called the unauthorized disclosure the “largest ever publication of confidential documents on the agency,” saying it exposed the malware and exploits the agency amassed to hack smartphones and turn some televisions into covert microphones.

A CIA spokesman declined to comment “on the authenticity or content of purported intelligence documents.”

An intelligence source said some of the information does pertain to tools that the CIA uses to hack computers and other devices. This person said disclosing the information would jeopardize ongoing intelligence-gathering operations and the revelations were far more significant than the leaks of Edward Snowden, a former contractor for the National Security Agency who exposed active surveillance programs in 2013.

Mr. Snowden’s leaks revealed names of programs, companies that assist the NSA in surveillance and in some cases the targets of American spying. But the recent leak purports to contain highly technical details about how surveillance is carried out. That would make them far more revealing and useful to an adversary, this person said.

In one sense, Mr. Snowden provided a briefing book on U.S. surveillance, but the CIA leaks could provide the blueprints.

WikiLeaks said in its statement that it was not publishing such information as computer source code that could be used to replicate the tools it claims to have exposed. But the group left open the possibility of publishing those crucial details if “a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should [sic] analyzed, disarmed and published.”

Mr. Snowden said in a tweet Tuesday, “Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic.”

WikiLeaks said the CIA recently “lost control” of the majority of its hacking arsenal. “This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA,” the site said in a statement. “The archive appears to have been circulating among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”

The website put out what it called the first installment in a series of planned leaks on Tuesday, calling it “Year Zero.” It said the first installment “introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of ‘zero day’ weaponized exploits against a wide range of U.S. and European company products.”

WikiLeaks said the information on CIA hacking came from an unidentified source who believes the spy agency’s hacking authorities “urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency.”

Much of what WikiLeaks posted Tuesday appeared to be a kind of internal Wikipedia for U.S. cyber-warfare developers to collaborate, post and access information about available hacking tools. In many instances, WikiLeaks has redacted entries that appear to link to specific executable files. The documents show, for example, what capabilities exist to bypass antivirus software, with a different entry for each antivirus company.

The revelations are sure to fuel an ongoing debate over whether intelligence agencies that discover security flaws in popular technology should disclose them, so that the users can defend themselves from hackers, or keep that information secret for use in intelligence operations.

One document claims that the CIA has discovered numerous ways to hack into versions of Apple’s iOS, the mobile operating system used on iPhones. In general, hacking tools for the iPhone are considered especially valuable because the technology is so widely used, experts said. One particular hacking tool appears to remain on an iPhone even after it has been rebooted, which would make it particularly valuable to an intruder.

“These documents, which appear to be authentic, show that the intelligence community has deliberately maintained vulnerabilities in the most common devices used by hundreds of millions of people,” Ben Wizner, the director of the Speech, Privacy, and Technology Project at the American Civil Liberties Union, said in a statement.

“Those vulnerabilities will be exploited not just by our security agencies, but by hackers and governments around the world. The government has the capacity and obligation to help technology companies fix vulnerabilities as soon as they are discovered,” Mr. Wizner said.

This is the latest high-profile leak of information by WikiLeaks, which last fall published emails stolen from Mrs. Clinton’s campaign chairman, John Podesta. U.S. intelligence agencies concluded that Russian government hackers stole those emails and provided them to WikiLeaks.

WikiLeaks said the documents show the CIA’s ability to bypass the encryption of popular messenger applications, including WhatsApp, Signal, Telegram and Confide by hacking the smartphones they run on and collecting audio and message traffic before the applications encrypt the user’s texts.

The site said the documents also show how the CIA developed other mobile hacking technologies, including the ability to activate the camera and microphone of a target’s smartphone covertly and surreptitiously retrieve a target’s geolocation, audio and text communications.

WikiLeaks said one of the documents also shows how the CIA developed a program to hack internet-connected televisions in conjunction with British intelligence. The attacks can place Samsung smart TVs in a fake off mode, so the owner believes the television is switched off, while in reality it is functioning as a bug and recording conversations in the room, WikiLeaks said.

https://www.wsj.com/articles/wikileaks-posts-thousands-of-purported-cia-cyberhacking-documents-1488905823

WikiLeaks publishes massive trove of CIA spying files in ‘Vault 7’ release

Julian Assange claims that documents are the most comprehensive CIA release ever and are far larger than the Snowden files

The Independent Tech

WikiLeaks has published a huge trove of what appear to be CIA spying secrets.

The files are the most comprehensive release of US spying files ever made public, according to Julian Assange. In all, there are 8,761 documents that account for “the entire hacking capacity of the CIA”, Mr Assange claimed in a release, and the trove is just the first of a series of “Vault 7” leaks.

Already, the files include far more pages than the Snowden files that exposed the vast hacking power of the NSA and other agencies.

 In publishing the documents, WikiLeaks had ensured that the CIA had “lost control of its arsenal”, he claimed. That included a range of software and exploits that if real could allow unparalleled control of computers around the world.

It includes software that could allow people to take control of the most popular consumer electronics products used today, claimed WikiLeaks.

“‘Year Zero’ introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones,” the organisation said in a release.

The public files don’t include the cyber weapons themselves, according to a statement. The organisation will refrain from distributing “armed” software “until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published”, it said.

The files were made available by a source who intended for them to start a conversation about whether the CIA had gained too much power, according to the organisation.

“In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency,” a release read. “The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.”

It also redacts the details of some of the names, locations and targets that are identified in the documents.

The organisation had teased the release in advance with strange messages about the release being “Year Zero”, and references to “Vault 7”. It had planned to release the files later on but that plan was thrown off when its press conference came under cyber attack, Mr Assange claimed.

http://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-cia-vault-7-julian-assange-year-zero-documents-download-spying-secrets-a7616031.html

WikiLeaks releases ‘entire hacking capacity of the CIA’

Gutfeld: ‘Day Without a Woman’ strike sends wrong message

WikiLeaks on Tuesday released what it said is the full hacking capacity of the CIA in a stunning 8,000-plus page disclosure the anti-secrecy website contends is “the largest ever publication of confidential documents on the agency.”

The 8,761 documents and files — released as “Vault 7 Part 1” and titled “Year Zero” — were obtained from an “isolated, high-security network” at the CIA’s Center for Cyber Intelligence in Langley, Va., a press release from the website said. The trove had been “circulated among former U.S. government hackers and contractors,” one of whom “recently” gave the archive to WikiLeaks. The CIA allegedly employs more than 5,000 people in its cyber spying operation and had produced more than 1,000 programs as of 2016.

“We do not comment on the authenticity or content of purported intelligence documents,” a CIA spokesperson told Fox News.

The collection of purported intelligence documents includes information on CIA-developed malware — bearing names such as “Assassin” and “Medusa” — intended to target iPhones, Android phones, smart TVs and Microsoft, Mac and Linux operating systems, among others. An entire unit in the CIA is devoted to inventing programs to hack data from Apple products, according to WikiLeaks.

WIKILEAKS OFFERS REWARD FOR INFO ON OBAMA MISDEEDS

Some of the remote hacking programs can allegedly turn numerous electronic devices into recording and transmitting stations to spy on their targets, with the information then sent back to secret CIA servers. One document appears to show the CIA was trying to “infect” vehicle control systems in cars and trucks for unspecified means.

WikiLeaks hinted that the capabilites revealed in Tuesday’s disclosure could have even darker utility than simply spying.

“It would permit the CIA to engage in nearly undetectable assassinations,” the release stated.

WikiLeaks confirms CIA can effectively bypass Signal + Telegram + WhatsApp + Confide encryptionhttps://wikileaks.org/ciav7p1 

FLASHBACK: WIKILEAKS REVEALS CLINTON ‘HITS’ FILE ON SANDERS

The site said the CIA additionally failed to disclose security vulnerabilities and bugs to major U.S. software manufacturers, violating an Obama administration commitment made in January 2014. Instead, the agency used the software vulnerabilities — which could also be exploited by rival agencies, nations and groups — for its own ends, WikiLeaks said.

CIA hackers celebrated what they saw as the financial largesse of Obama towards them with “Make It Rain” gifhttps://wikileaks.org/ciav7p1/cms/files/makeitrain.gif 

“As an example, specific CIA malware revealed in ‘Year Zero’ is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts,” the WikiLeaks release stated.

Digital rights non-profit Access Now said in a statement on Tuesday it was “fantasy to believe only the ‘good guys'” would be able to use the discovered vulnerabilities.

“Today, our digital security has been compromised because the CIA has been stockpiling vulnerabilities rather than working with companies to patch them,” Senior Legislative Manager Nathan White said.

The CIA allegedly also maintains a database of malware created in other nations — WikiLeaks specifically cites Russia — in order to disguise its own hacking attempts as the work of another group.

In what is described by WikiLeaks as “one of the most astounding intelligence own goals in living memory,” the CIA is said to have made most of its programs unclassified to avoid legal consequences for transmitting classified information through the Internet — a move that increased the risk of outside groups pirating the cyber spying tools.

WikiLeaks also revealed the U.S. Consulate in Frankfurt is a hacking base, and the website provided the methods by which agents obfuscate customs officers to gain entry to Germany, pretending to provide technical consultation.

WikiLeaks said its source released the files because they believed questions surrounding the CIA’s reach “urgently need to be debated in public,” echoing the motives of many previous leakers.

PSA: This incorrectly implies CIA hacked these apps / encryption. But the docs show iOS/Android are what got hacked – a much bigger problem. https://twitter.com/wikileaks/status/839120909625606152 

Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic.

One such former leaker, Edward Snowden, tweeted Tuesday afternoon about the WikiLeaks release.

“Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic,” wrote Snowden, who has been granted asylum in Russia as he seeks to avoid criminal prosecution in the U.S.

Some of the WikiLeaks files include redacted information, such as tens “of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States.”

http://www.foxnews.com/us/2017/03/07/wikileaks-releases-entire-hacking-capacity-cia.html

Vault 7: CIA Hacking Tools Revealed

  • Releases
  • Documents

Press Release

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includesnumerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of “Vault 7” — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‘battlefield’ of cyber ‘war’.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted “malware injections” (commercial jargon) or “implant drops” (NSA jargon) are being called “fires” as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful ‘attack’ on a target’s computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization’s leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target’s territory including observation, infiltration, occupation and exploitation.

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.

CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.

Examples

The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks’ “Year Zero”.

UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals. The ‘Case Officer’ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‘menu’ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‘JQJIMPROVISE’ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

Improvise (JQJIMPROVISE)

‘Improvise’ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‘Fine Dining’ questionairies.

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE.

Frequently Asked Questions

Why now?

WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a “Cyberwar” review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

Redactions

Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

  1. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
  2. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
  3. Archive attachments (zip, tar.gz, …) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
  4. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
  5. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
  6. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

Wiki pages

“Year Zero” contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.

The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

Is each part of “Vault 7” from a different source?

Details on the other parts will be available at the time of publication.

What is the total size of “Vault 7”?

The series is the largest intelligence publication in history.

How did WikiLeaks obtain each part of “Vault 7”?

Sources trust WikiLeaks to not reveal information that might help identify them.

Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

Has WikiLeaks already ‘mined’ all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

Won’t other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.

https://wikileaks.org/ciav7p1/

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 850-853

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 759, September 20, 2016, Story 1: Obama’s Globalist Swan Song To United Nations — Course Correction — Time To Take The United Nations Out of The United States and Relocate It to Democratic Republic of Congo and United States Out of United Nations — Videos — Story 2: Trump Calls For Tighter Screening of Immigrants and Extreme Vetting and Police Profiling in Wake of Bombings — Videos

Posted on September 20, 2016. Filed under: 2016 Presidential Campaign, 2016 Presidential Candidates, American History, Benghazi, Blogroll, Breaking News, Congress, Constitutional Law, Corruption, Countries, Crime, Cruise Missiles, Culture, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Drones, Education, Elections, Empires, Employment, Fast and Furious, Genocide, Government Dependency, Government Spending, Hillary Clinton, Hillary Clinton, History, House of Representatives, Illegal Immigration, Illegal Immigration, Immigration, Iran Nuclear Weapons Deal, Islam, Islamic Republic of Iran, Law, Legal Immigration, Medicare, MIssiles, News, Nuclear, Obama, Philosophy, Photos, Politics, Polls, President Barack Obama, Progressives, Radio, Raymond Thomas Pronk, Regulation, Religion, Scandals, Second Amendment, Security, Senate, Socials Security, Taxation, Taxes, Terror, Terrorism, Unemployment, United States Constitution, United States of America, Videos, Violence, War, Wealth, Weapons, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 759: September 20, 2016

Pronk Pops Show 758: September 19, 2016 

Pronk Pops Show 757: September 16, 2016 

Pronk Pops Show 756: September 15, 2016

Pronk Pops Show 755: September 14, 2016 

Pronk Pops Show 754: September 13, 2016 

Pronk Pops Show 753: September 12, 2016 

Pronk Pops Show 752: September 9, 2016 

Pronk Pops Show 751: September 8, 2016 

Pronk Pops Show 750: September 7, 2016 

Pronk Pops Show 749: September 2, 2016 

Pronk Pops Show 748: September 1, 2016

Pronk Pops Show 747: August 31, 2016 

Pronk Pops Show 746: August 30, 2016 

Pronk Pops Show 745: August 29, 2016 

Pronk Pops Show 744: August 26, 2016 

Pronk Pops Show 743: August 25, 2016