Socials Security

The Pronk Pops Show 1018, January 17, 2018, Story 1: Ageism Rampant in White House Press Questioning of President Trump Physician — Backlash of Older Voters In 2018 and 2020 Election —  Trump in Excellent Health and Big Lie Media Nuts of Lying Lunatic Left — Videos –Story 2: 70 Percent of Americans Are Overweight or Obese — President Trump Joins The Huge Fluffy Majority — Videos — Story 3: President Trump’s Fake News Awards of 2017 — Big Lie Media’s Junk Journalism Progressive Propaganda Exposed — Videos

Posted on January 18, 2018. Filed under: Addiction, American History, Biology, Blogroll, Breaking News, Chemistry, Communications, Countries, Diet, Donald J. Trump, Donald J. Trump, Donald Trump, Drugs, Elections, Employment, Exercise, Food, Freedom of Speech, Government Spending, Health, Health Care, Hillary Clinton, Hillary Clinton, History, Human, Human Behavior, Illegal Drugs, Illegal Immigration, Independence, Insurance, IRS, Language, Law, Legal Drugs, Life, Media, Medical, Medicare, Medicine, National Interest, Obama, People, Philosophy, Photos, Politics, Polls, President Trump, Privacy, Radio, Raymond Thomas Pronk, Regulation, Scandals, Science, Socials Security, Success, Surveillance/Spying, Taxation, Taxes, Trump Surveillance/Spying, United States of America, War, Wealth, Weather, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 1018, January 17, 2018

Pronk Pops Show 1017, January 16, 2018

Pronk Pops Show 1016, January 10, 2018

Pronk Pops Show 1015, January 9, 2018

Pronk Pops Show 1014, January 8, 2018

Pronk Pops Show 1013, December 13, 2017

Pronk Pops Show 1012, December 12, 2017

Pronk Pops Show 1011, December 11, 2017

Pronk Pops Show 1010, December 8, 2017

Pronk Pops Show 1009, December 7, 2017

Pronk Pops Show 1008, December 1, 2017

Pronk Pops Show 1007, November 28, 2017

Pronk Pops Show 1006, November 27, 2017

Pronk Pops Show 1005, November 22, 2017

Pronk Pops Show 1004, November 21, 2017

Pronk Pops Show 1003, November 20, 2017

Pronk Pops Show 1002, November 15, 2017

Pronk Pops Show 1001, November 14, 2017 

Pronk Pops Show 1000, November 13, 2017

Pronk Pops Show 999, November 10, 2017

Pronk Pops Show 998, November 9, 2017

Pronk Pops Show 997, November 8, 2017

Pronk Pops Show 996, November 6, 2017

Pronk Pops Show 995, November 3, 2017

Pronk Pops Show 994, November 2, 2017

Pronk Pops Show 993, November 1, 2017

Pronk Pops Show 992, October 31, 2017

Pronk Pops Show 991, October 30, 2017

Pronk Pops Show 990, October 26, 2017

Pronk Pops Show 989, October 25, 2017

Pronk Pops Show 988, October 20, 2017

Pronk Pops Show 987, October 19, 2017

Pronk Pops Show 986, October 18, 2017

Pronk Pops Show 985, October 17, 2017

Pronk Pops Show 984, October 16, 2017 

Pronk Pops Show 983, October 13, 2017

Pronk Pops Show 982, October 12, 2017

Pronk Pops Show 981, October 11, 2017

Pronk Pops Show 980, October 10, 2017

Pronk Pops Show 979, October 9, 2017

Pronk Pops Show 978, October 5, 2017

Pronk Pops Show 977, October 4, 2017

Pronk Pops Show 976, October 2, 2017

Pronk Pops Show 975, September 29, 2017

Pronk Pops Show 974, September 28, 2017

Pronk Pops Show 973, September 27, 2017

Pronk Pops Show 972, September 26, 2017

Pronk Pops Show 971, September 25, 2017

Pronk Pops Show 970, September 22, 2017

Pronk Pops Show 969, September 21, 2017

Pronk Pops Show 968, September 20, 2017

Pronk Pops Show 967, September 19, 2017

Pronk Pops Show 966, September 18, 2017

Pronk Pops Show 965, September 15, 2017

Pronk Pops Show 964, September 14, 2017

Pronk Pops Show 963, September 13, 2017

Pronk Pops Show 962, September 12, 2017

Pronk Pops Show 961, September 11, 2017

Pronk Pops Show 960, September 8, 2017

Pronk Pops Show 959, September 7, 2017

Pronk Pops Show 958, September 6, 2017

Pronk Pops Show 957, September 5, 2017

See the source image

See the source image

See the source image

See the source image

Story 1: Ageism Rampant in White House Press Questioning of President Trump Physician — Backlash of Older Voters In 2018 and 2020 Election —  Trump in Excellent Health and Big Lie Media Nuts of Lying Lunatic Left — Videos —

 

See the source image

See the source image

Doctors give president a clean bill of health

“The president’s overall health is excellent.” (C-SPAN)

Mainstream media hammers physician over Trump’s health

Media upset by Trump’s clean bill of health?

The #MSM Grill Trump’s Docs on His Health But Ignored Hillary’s Neurologic Trauma and 9/11 Collapse

Dr. Gupta: Trump a heart disease risk

Borderline Obese Trump in Excellent Health

Confirmation Bias: Your Brain is So Judgmental

12 Cognitive Biases Explained – How to Think Better and More Logically Removing Bias

Tomi Lahren: ‘Disgusting’ media behavior on Trump’s health

Reporters grill doctor over Trump’s clean bill of health

Trump aces Montreal Cognitive Assessment test

Donald Trump physical examination results full press conference

Are our perceptions of age distorted?

The Roots and Consequences of Ageism in America

Aging: It’s Not What You Think | Thad Polk | TEDxUofM

How to die young at a very old age | Nir Barzilai | TEDxGramercy

Let’s change the way we think about old age | ​Zaria Gorvett | TEDxLausanne

Ageism is all around us – hear how it affects older people around the world

Millennials Show Us What ‘Old’ Looks Like | Disrupt Aging | AARP

Ageism: A short documentary

Michael’s Tutorial on Avoiding Ageism – The Office US

Gabriel Iglesias I’m Not Fat … I’m Fluffy Full Show(2009)

 

 

Ageism

From Wikipedia, the free encyclopedia

Ageism (also spelled “agism“) is stereotyping of and discrimination against individuals or groups on the basis of their age. This may be casual or systematic.[1][2] The term was coined in 1969 by Robert Neil Butler to describe discrimination against seniors, and patterned on sexism and racism.[3] Butler defined “ageism” as a combination of three connected elements. Among them were prejudicial attitudes towards older people, old age, and the aging process; discriminatory practices against older people; and institutional practices and policies that perpetuate stereotypes about elderly people.[4]

While the term is also used to name prejudice and discrimination against adolescents and children, including ignoring their ideas because they are too young, or assuming that they should behave in certain ways because of their age,[5] the term is predominantly used in relation to the treatment of older people. Moreover, it has been pointed out that stigmatization does not only occur outside of the cohesively imagined group of the elderly but likewise takes place within the stigmatized group itself.[6]Fear of death and fear of disability and dependence are major causes of ageism; avoiding, segregating, and rejecting older people are coping mechanisms that allow people to avoid thinking about their own mortality.[7]

It can also be passive and covert (e.g., a movie that shows only young people inhabiting a locality and no children, infants or old people are shown in the area) to drive the notion that the place is ‘young and romantic’.

Classification

Distinction from other age-related bias

Ageism in common parlance and age studies usually refers to negative discriminatory practices against old people, people in their middle years, teenagers and children. There are several forms of age-related bias. Adultism is a predisposition towards adults, which is seen as biased against children, youth, and all young people who are not addressed or viewed as adults.[8]Jeunism is the discrimination against older people in favor of younger ones. This includes political candidacies, jobs, and cultural settings where the supposed greater vitality and/or physical beauty of youth is more appreciated than the supposed greater moral and/or intellectual rigor of adulthood. Adultcentricism is the “exaggerated egocentrism of adults.”[9]Adultocracy is the social convention which defines “maturity” and “immaturity,” placing adults in a dominant position over young people, both theoretically and practically.[10]Gerontocracy is a form of oligarchical rule in which an entity is ruled by leaders who are significantly older than most of the adult population.[11]Chronocentrism is primarily the belief that a certain state of humanity is superior to all previous and/or future times.[12]

Based on a conceptual analysis of ageism, a new definition of ageism was introduced by Iversen, Larsen, & Solem in 2009. This definition constitutes the foundation for higher reliability and validity in future research about ageism and its complexity offers a new way of systemizing theories on ageism: “Ageism is defined as negative or positive stereotypes, prejudice and/or discrimination against (or to the advantage of) elderly people on the basis of their chronological age or on the basis of a perception of them as being ‘old’ or ‘elderly’. Ageism can be implicit or explicit and can be expressed on a micro-, meso- or macro-level” (Iversen, Larsen & Solem, 2009).[13]

Other conditions of fear or aversion associated with age groups have their own names, particularly: paedophobia, the fear of infants and children; ephebiphobia, the fear of youth,[14] sometimes also referred to as an irrational fear of adolescents or a prejudice against teenagers;[15] and gerontophobia, the fear of elderly people.[16]

Implicit ageism

Implicit ageism is the term used to refer to the implicit or subconscious thoughts, feelings, and behaviors one has about older or younger people. These may be a mixture of positive and negative thoughts and feelings, but gerontologist Becca Levy reports that they “tend to be mostly negative.”[17]

Stereotyping

Stereotyping is a tool of cognition which involves categorizing into groups and attributing characteristics to these groups. Stereotypes are necessary for processing huge volumes of information which would otherwise overload a person and are generally accurate descriptors of group characteristics, though some stereotypes are inaccurate.[18] However, they can cause harm when the content of the stereotype is incorrect with respect to most of the group or where a stereotype is so strongly held that it overrides evidence which shows that an individual does not conform to it. For example, age-based stereotypes prime one to draw very different conclusions when one sees an older and a younger adult with, say, back pain or a limp. One might well assume that the younger person’s condition is temporary and treatable, following an accident, while the older person’s condition is chronic and less susceptible to intervention. On average, this might be true, but plenty of older people have accidents and recover quickly and very young people (such as infants, toddlers and small children) can become permanently disabled in the same situation. This assumption may have no consequence if one makes it in the blink of an eye as one is passing someone in the street, but if it is held by a health professional offering treatment or managers thinking about occupational health, it could inappropriately influence their actions and lead to age-related discrimination. Managers have been accused, by Erdman Palmore, as stereotyping older workers as being resistant to change, not creative, cautious, slow to make judgments, lower in physical capacity, uninterested in technological change, and difficult to train.[19] Another example is when people are rude to children because of their high pitched voice, even if they are kind and courteous. A review of the research literature related to age stereotypes in the workplace was recently published in the Journal of Management.[20]

Contrary to common and more obvious forms of stereotyping, such as racism and sexism, ageism is more resistant to change. For instance, if a child believes in an ageist idea against the elderly, fewer people correct them, and, as a result, individuals grow up believing in ageist ideas, even elders themselves.[21] In other words, ageism can become a self-fulfilling prophecy.

Ageist beliefs against the elderly are commonplace in today’s society. For example, an older person who forgets something could be quick to call it a “senior moment,” failing to realize the ageism of that statement. People also often utter ageist phrases such as “dirty old man” or “second childhood,” and elders sometimes miss the ageist undertones.[21]

In a classic study, researchers analyzed the effects of ageism among the elderly.[22] They performed memory tests on three selected groups: residents of China, deaf North Americans, and hearing North Americans. In the three groups, the Chinese residents were presumably the least exposed to ageism, with lifelong experience in a culture that traditionally venerates older generations. Lifelong deaf North Americans also faced less exposure to ageism in contrast to those with typical hearing, who presumably had heard ageist comments their whole life. The results of the memory tests showed that ageism has significant effects on memory.

The gap in the scores between the young and old North Americans with normal hearing were double those of the deaf North Americans and five times wider than those of the Chinese participants. The results show that ageism undermines ability through its self-fulfilling nature.[21] The study was investigating the effect of the stereotype threat, which has been explored as a possible reason for memory deficits,[23] though the stereotype threat has been criticized.[24]

On the other hand, when elders show larger independence and control in their lives, defying ageist assumptions, they are more likely to be healthier, both mentally and physically, than other people their age.[21]

Research indicates that old people are stereotyped as scoring lower on measures of impulsivity, activism, antagonism and openness while young people are stereotyped as scoring higher on these measures. This was found to be universal across cultures and was also found to be reasonably accurate (varying depending on how the accuracy was assessed and the type of stereotype), though differences were consistently exaggerated.[25]

Prejudice

Ageist prejudice is a type of emotion which is often linked to the cognitive process of stereotyping. It can involve the expression of derogatory attitudes, which may then lead to the use of discriminatory behavior. Where older or younger contestants were rejected in the belief that they were poor performers, this could well be the result of stereotyping. But older people were also voted for on a stage in a game where it made sense to target the best performers. This can only be explained by a subconscious emotional reaction to older people; in this case, the prejudice took the form of distaste and a desire to exclude oneself from the company of older people.[26]

Stereotyping and prejudice against different groups in society does not take the same form. Age-based prejudice and stereotyping usually involves older or younger people being pitied, marginalized, or patronized. This is described as “benevolent prejudice” because the tendency to pity is linked to seeing older or younger people as “friendly” but “incompetent.” This is similar to the prejudice most often directed against women and disabled people. Age Concern‘s survey revealed strong evidence of “benevolent prejudice.” 48% said that over-70s are viewed as friendly (compared to 27% who said the same about under-30s). Meanwhile, only 26% believe over-70s are viewed as capable (with 41% saying the same about under-30s).[27]

The figure for friendliness of under-30s is, conversely, an example of Hostile Prejudice. Hostile prejudice based on hatred, fear, aversion, or threat often characterizes attitudes linked to race, religion, disability, and sex. An example of hostile prejudice toward youth is the presumption without any evidence that a given crime was committed by a young person. Rhetoric regarding intergenerational competition can be motivated by politics. Violence against vulnerable older people can be motivated by subconscious hostility or fear; within families, this involves impatience and lack of understanding. Equality campaigners are often wary of drawing comparisons between different forms of inequality.[citation needed]

The impact of “benevolent” and “hostile” prejudice tends to be different. The warmth felt towards older or younger people and the knowledge that many have no access to paid employment means there is often public acceptance that they are deserving of preferential treatment—for example, less expensive movie and bus fares. But the perception of incompetence means older and younger people can be seen as “not up to the job” or “a menace on the roads,” when there is little or exaggerated evidence to support this. Prejudice also leads to assumptions that it is “natural” for older or younger people to have lower expectations, reduced choice and control, and less account taken of their views.[citation needed]

Digital ageism

Digital ageism refers to the prejudices faced by older adults in the digital world. A few examples of the subtle ways in which digital ageism operates in cultural representations, research, and everyday life: Generational segregation naturalizes youth as digitally adept and the old as digital dunces. There is no empirical evidence, though, for a digital divide between older and younger people, with the former never and the latter always capable to use digital media; a far more accurate description is that of a digital spectrum.[28][29][30] The reason for the myth of declining capabilities of older people could be that many cultural representations have long histories reproducing images of the life cycle as a mountain, where we peak in middle age then decline[29][31][32] Older adults’ experiences are often excluded from research agendas on digital media, and ageism is ensconced within disciplines such as mass communication studies. For example, in a media diffusionist perspective,[33] the practices of seniors are depicted as either negligible or as lagging, and the equation of diffusion with individual ownership can hide practical ‘work-arounds’ such as cell phone sharing or missed calls used by older couples on fixed incomes.[34][35] Ageism is also inadvertently embedded in the ways that we generate statistics, for example through data collected based on large age categories (e.g., ’60+’) foisting anyone over 60 into ‘the grey zone’ which obscures differences.[36]

Visual ageism

The term visual ageism was coined in 2017 by Loos and Ivan. They define visual ageism as “the social practice of visually underrepresenting older people or misrepresenting them in a prejudiced way”.[37] We are facing a shift from visual ageism characterized by underrepresentation and the negative representation of older people to a representation of older age characterized by images of stereotypically third age older adults (enjoying life and living their golden years), while older adults in their fourth age (inactive and unable to live independently) remain invisible. A review of empirical studies conducted since 1950 in Europe and North America[37] reveals that print and television advertisements started this transition towards a more positive visual representation of older adults in their age during the last decade of the 20th century, followed by television programs some years later, while older adults in their fourth age remain invisible. This is probably due to the increase in third age rhetoric in the media, picturing older people as healthy and as potential consumers, enjoying life and living their golden years. Media representations of older people have moved from visual under- and misrepresentation (negative images)[38][39][40][41] to more positive depictions[42][43][37] These days, visual ageism in the media tends to come wrapped in the guise of the positive attributes of third age representations of older people, while adults in their fourth age continue to be underrepresented. One possible explanation for this is that healthy third agers might prefer not to be associated with fourth agers, as they remind them too starkly of what lies ahead in their own near future. Although this discomfort or even fear about mortality is undeniably common, from a societal point of view this kind of (self)ageism is hurtful to fourth agers as a group and in a sense to third agers as well, as they risk to become fourth agers themselves one day.[37]

Discrimination

Age discrimination is the result of actions taken to deny or limit opportunities to people on the basis of age. These are usually actions taken as a result of one’s ageist beliefs and attitudes. Age discrimination occurs on both a personal and institutional level.[2]

On a personal level, an older person may be told that he or she is too old to engage in certain physical activities, like an informal game of basketball between friends and family. A younger person may be told they are too young to get a job or help move the dining room table. On an institutional level, there are policies and regulations in place that limit opportunities to people of certain ages and deny them to all others. The law, for instance, requires that all people must be at least 16 years old in order to obtain a driver’s license in the United States. There are also government regulations that determine when a worker may retire. Currently, in the US, a worker must be between 65 and 67 years old (depending upon his or her birth year) before becoming eligible for full Social Security retirement benefits (age 62 for 70% benefits) but some company pension plans begin benefits at earlier ages.[citation needed]

A 2006/2007 survey done by the Children’s Rights Alliance for England and the National Children’s Bureau asked 4,060 children and young people whether they have ever been treated unfairly based on various criteria (race, age, sex, sexual orientation, etc.). A total of 43% of British youth surveyed reported experiencing discrimination based on their age, far eclipsing other categories of discrimination like sex (27%), race (11%), or sexual orientation (6%).[44] Consistently, a study based on the European Social Survey found that whereas 35% of Europeans reported exposure ageism, only 25% reported exposure to sexism and as few as 17% reported exposure to racism.[45]

Ageism has significant effects in two particular sectors: employment and health care. Age discrimination has contributed to disparities in health between men and women. Reducing ageism and sexism would promote improved doctor-patient relationships and reduce ageist stereotypes in the healthcare industry.[46]

Employment

The concept of ageism was originally developed to refer to prejudice and discrimination against older people and middle age, but has expanded to include children and teenagers.[27] Like racial and gender discrimination, age discrimination, at least when it affects younger workers, can result in unequal pay for equal work. Unlike racial and gender discrimination, however, age discrimination in wages is often enshrined in law. For example, in both the United States[47] and the United Kingdom[48]minimum wage laws allow for employers to pay lower wages to young workers. Many state and local minimum wage laws mirror such an age-based, tiered minimum wage. As well, the Fair Labor Standards Act of 1938 was amended in 1986 to allow the United States Secretary of Labor to provide special certificates to allow an employer to pay less than the minimum wage to individuals whose earning or productive capacity is impaired by age, physical or mental deficiency, or injury.[49] These employees must still be paid wages that are related to the individual’s productivity and commensurate with those paid to similarly located and employed non-handicapped workers.[49]Midlife workers, on average, make more than younger workers do, which reflects educational achievement and experience of various kinds (job-specific, industry-specific, etc.). The age-wage peak in the United States, according to Census data, is between 45 and 54 years of age. Seniority in general accords with respect as people age, lessening ageism. Statistical discrimination refers to limiting the employment opportunities of an individual based on stereotypes of a group to which the person belongs. Limited employment opportunities could come in the form of lower pay for equal work or jobs with little social mobility. Younger female workers were historically discriminated against, in comparison with younger men, because it was expected that, as young women of childbearing years, they would need to leave the work force permanently or periodically to have children.[50] However, midlife female workers may also experience discrimination based on their appearance[51] and may feel less visible and undervalued[52] in a culture where emphasis is on maintaining an approved standard of beauty, e.g. ‘thin, pretty, White, and young’.[53] However, the same standard could have no effect on male colleagues of the same age.[52]Labor regulations also limit the age at which people are allowed to work and how many hours and under what conditions they may work. In the United States, a person must generally be at least 14 years old to seek a job, and workers face additional restrictions on their work activities until they reach age 16.[54] Many companies refuse to hire workers younger than 18. While older workers benefit more often from higher wages than do younger workers, they face barriers in promotions and hiring. Employers also encourage early retirementor layoffs disproportionately more for older or more experienced workers.

Some political offices have qualifications that discriminate on the basis of age as a proxy for experience, education, or accumulated wisdom. For example, the President of the United States must be at least 35 years old; a United States Senator must be at least 30; and a United States Congress member must be at least 25. In the UK, age discrimination against older people has been prohibited in employment since 2006. Since then, the number of age discrimination cases rose dramatically. The laws protect anyone over the age of 16 who is young as well as old. There were over 6,800 claims submitted to the Employment Tribunal in 2010/11 compared with just 900 in 2006/2007 (immediately after the Regulations came in force).[55] However, the figures for 2011/2012 show a 47% fall in the number of claims, and commentators have suggested that the repeal of the Default Retirement Age may be the reason behind this.

Age discrimination in hiring has been shown to exist in the United States. The Equal Employment Opportunity Commission‘s first complainants were female flight attendants complaining of (among other things) age discrimination.[56] In 1968, the EEOC declared age restrictions on flight attendants’ employment to be illegal sex discrimination under Title VII of the Civil Rights Act of 1964.[57] However, Joanna Lahey, professor at The Bush School of Government and Public Service at Texas A&M, found recently that firms are more than 40% more likely to interview a young adult job applicant than an older job applicant.[58] All states in the US prohibit youth under 14 from working with a handful of exceptions, and prohibit youth under 18 from working in hazardous occupations. They are also paid a lower minimum wage and not allowed to work full-time.

Also in Europe, pervasive levels of age discrimination are found in BelgiumEnglandFrance, Spain, and Sweden. Job candidates revealing older age are found to get 39% (in Belgium) to 72% (in France) less job interview invitations compared to equal candidates revealing a younger name.[59][60][61][62][63][64][65] In addition, In a survey for the University of Kent, England, 29% of respondents stated that they had suffered from age discrimination. This is a higher proportion than for gender or racial discrimination. Dominic Abramssocial psychology professor at the university, concluded that Ageism is the most pervasive form of prejudice experienced in the UK population.[66] Discrimination is found to be heterogeneous by the activity older candidates undertook during their additional post-educational years. In Belgium, they are only discriminated if they have more years of inactivity or irrelevant employment.[59]

According to Dr. Robert M. McCann, an associate professor of management communication at the University of Southern California‘s Marshall School of Business, denigrating older workers, even if only subtly, can have an outsized negative impact on employee productivity and corporate profits.[citation needed] For American corporations, age discrimination can lead to significant expenses. In Fiscal Year 2006, the U.S. Equal Employment Opportunity Commission received nearly 17,000 charges of age discrimination, resolving more than 14,000 and recovering $51.5 million in monetary benefits. Costs from lawsuit settlements and judgments can run into the millions, most notably with the $250 million paid by the California Public Employees’ Retirement System (CalPERS) under a settlement agreement in 2003.[67][68]

Hollywood

Ageism in Hollywood, specifically in terms of women, is profound, from the way youth is praised to the lack of jobs for older actresses. The way youth is praised reflects directly on the way older women are presented in the media. President and CEO of the American Association of Advertising Agencies, O. Burtch Drake, spoke in terms of older women’s representation throughout the media stating “older women are not being portrayed at all; there is no imagery to worry about.”[69] Women over fifty are not the center of attention and if an actress is older they are expected to act anything but their age.[70] These same women who have been acting since their teenage years, who have always been told to act their age, now must change the dynamic of their job by not acting their age when they get to be considered old by society and the media. The standards set in film are fixated upon youth – sexuality, beauty, physicality. Movies that portray women acting their own age (i.e. a 50-year-old acting 50 years old) seems exaggerated and unrealistic because it does not fit the norms associated with women in film and media.[70] Women are forced to feel that they must continuously improve upon their looks to be seen and they can be replaced by a younger model of themselves. “Silver ceiling” references the new type of ceiling older workers in the entertainment industry, especially women, are being faced with. Underemployment of older actresses surpasses that of older actors because of the typical pairing of older actors with younger actresses in films.[71] BBC news anchor, Nigel Kay, found in a survey that “on television older men significantly outnumber older women by about 70 percent to 30 percent.”[69] An issue amongst older women is that their voices are not being heard, which is especially true for older actresses in Hollywood. The issues about employment they are bringing to light as well as the complaints they have are not being taken seriously and they are being excluded from conversations about Hollywood and employment.[72]

Because of the limited ages the film industry portrays and the lack of older actresses, society as a whole has a type of illiteracy about sexuality and those of old age. There is an almost inherent bias about what older women are capable of, what they do, and how they feel.[73] Amongst all ages of actresses there is the attempt to look youthful and fitting to the beauty standards by altering themselves physically, many times under the hands of plastic surgeons.[70] Women become frightful of what they will be seen as if they have wrinkles, cellulite, or any other signifier of aging.[71] As women reach their forties and fifties, pressure to adhere to societal beauty norms seen amongst films and media intensifies in terms of new cosmetic procedures and products that will maintain a “forever youthful” look.[71] In terms of sexuality, older women are seen as unattractive, bitter, unhappy, unsuccessful in films. With older women not being represented in the media and film industries, specifically in Hollywood, thoughts of underachievement, ugliness, and disgust crowd the thoughts of older women as they fail to meet beauty norms. This can cause depression, anxiety, and self-esteem issues in general.[71] “In one survey, women reported feeling more embarrassed about their age than by their masturbation practices or same-gender sexual encounters.”[71] Women are forced to feel that they must continuously improve upon their looks to be seen and they can be replaced by a younger model of themselves.

The ideal that younger actresses are better than older actresses in Hollywood can be seen by the preferences of the people who are watching movies. Movie spectators display discrimination against older women in Hollywood. A study between 1926-1999 proved that older men in Hollywood had more leading roles than women who were the same age as them.[74] There are many cases where leading actors play the attractive love interest for longer than women.[71] This portrayal of women never aging but men aging can have a negative affect on not only actresses in Hollywood but also women who are not in the media.[71] There are fewer older actresses that get leading roles than young actresses, this promotes the idea that women do not age and that older women are less attractive. This can be harmful to women because they will strive for something that is impossible to have, eternal youth.[71]

What some people think of as old other people may not. An actress in Hollywood may not consider herself old but can be told she is too old for a part. A very well known example of this is what happened to the actress Maggie Gyllenhaal, “she was recently turned down for a role in a movie because she was too old to play the love interest for a 55-year-old man.”[75] When a woman is told she is old she can start to believe that she is. A woman can start acting as if she is older than she believes because she internalizes what other people are saying and what they think about her.[76]

In film the female body is depicted in different states of dress, and portrayed differently depending on the age of the actress. Their clothing is used as an identity marker of the character. Young women are put into revealing and sexy costumes whereas older women often play the part of a mother or grandmother clad in appropriate attire. This can include a bonnet or apron as she carries about her matronly duties.[77] This can lead both men and women to perceive the female body in a certain way based on what is seen on screen. Annette Kuhn said twenty years ago that “One of the major theoretical contributions of the women’s movement has been its insistence on the significance of cultural factors, in particular in the form of socially dominant representations of women and the ideological character of such representation, both in constituting the category ‘woman’ and in delimiting and defining what has been called the ‘sex-gender system'”[77] Women’s bodies are often seen as an object to be looked at and desired by men. As women get older and enter their post-menopausal years, they no longer are examples of the ideal feminine model. Added to that is the idea that females become mentally unstable as they enter their older years. “They become quarrelsome, vexatious and overbearing, petty and stingy; that is to say they exhibit typically sadistic and anal-erotic traits that they did not possess earlier…(Freud 1958,323-24)”[77] Ageism is not new to Hollywood and has been around since the time of silent films. When transitioning from silent movies to talking motion pictures, Charlie Chaplin (a well known silent movie actor) said in an interview that “It’s beauty that matters in pictures-nothing else….Pictures! Lovely looking girls…What if the girls can’t act?…Certainly I prefer to see, say, Dolores Costello [a 1920s silent movie star], in a thin tale than some aged actress of the stage (Walker 1979,132)”.[77]

Healthcare

There is considerable evidence of discrimination against the elderly in health care.[78][79][80] This is particularly true for aspects of the physician-patient interaction, such as screening procedures, information exchanges, and treatment decisions. In the patient-physician interaction, physicians and other health care providers may hold attitudes, beliefs, and behaviors that are associated with ageism against older patients. Studies have found that some physicians do not seem to show any care or concern toward treating the medical problems of older people. Then, when actually interacting with these older patients on the job, the doctors sometimes view them with disgust and describe them in negative ways, such as “depressing” or “crazy.”[81] For screening procedures, elderly people are less likely than younger people to be screened for cancers and, due to the lack of this preventative measure, less likely to be diagnosed at early stages of their conditions.[82]

After being diagnosed with a disease that may be potentially curable, older people are further discriminated against. Though there may be surgeries or operations with high survival rates that might cure their condition, older patients are less likely than younger patients to receive all the necessary treatments. For example, health professionals pursue less aggressive treatment options in older patients,[83] and fewer adults are enrolled in tests of new prescription drugs.[84] It has been posited that this is because doctors fear their older patients are not physically strong enough to tolerate the curative treatments and are more likely to have complications during surgery that may end in death.

Other research studies have been done with patients with heart disease, and, in these cases, the older patients were still less likely to receive further tests or treatments, independent of the severity of their health problems. Thus, the approach to the treatment of older people is concentrated on managing the disease rather than preventing or curing it. This is based on the stereotype that it is the natural process of aging for the quality of health to decrease, and, therefore, there is no point in attempting to prevent the inevitable decline of old age.[81][82]

Furthermore, caregivers further undermine the treatment of older patients by helping them too much, which decreases independence,[85] and by making a generalized assumption and treating all elderly as feeble.[21]

Differential medical treatment of elderly people can have significant effects on their health outcomes, a differential outcome which somehow escapes established protections.

In 2017, the European Court of Human Rights ruled in favor of Maria Ivone Carvalho Pinto de Sousa Morais, who had had an operation that was mishandled and rendered her unable to have sex. Portuguese judges had previously reduced damages to her in 2014, ruling then that the operation, which occurred when she was 50, had happened at “an age when sex is not as important as in younger years.” The European Court of Human Rights rejected that decision, with the majority’s ruling stating in part, “The question at issue here is not considerations of age or sex as such, but rather the assumption that sexuality is not as important for a 50-year-old woman and mother of two children as for someone of a younger age. That assumption reflects a traditional idea of female sexuality as being essentially linked to childbearing purposes and thus ignores its physical and psychological relevance for the self-fulfillment of women as people.”[86]

Effects of ageism

Ageism has significant effects on the elderly and young people. The stereotypes and infantilization of older and younger people by patronizing language affects older and younger people’s self-esteem and behaviors. After repeatedly hearing a stereotype that older or younger people are useless, older and younger people may begin to feel like dependent, non-contributing members of society. They may start to perceive themselves in terms of the looking-glass self—that is, in the same ways that others in society see them. Studies have also specifically shown that when older and younger people hear these stereotypes about their supposed incompetence and uselessness, they perform worse on measures of competence and memory.[87] These stereotypes then become self-fulfilling prophecies. According to Becca Levy‘s Stereotype Embodiment Theory, older and younger people might also engage in self-stereotypes, taking their culture’s age stereotypes—to which they have been exposed over the life course—and directing them inward toward themselves. Then this behavior reinforces the present stereotypes and treatment of the elderly.[17][81]

Many overcome these stereotypes and live the way they want, but it can be difficult to avoid deeply ingrained prejudice, especially if one has been exposed to ageist views in childhood or adolescence.

Australia

Australia has had age discrimination laws for some time.[88] Discrimination on the basis of age is illegal in each of the states and territories of Australia. At the national level, Australia is party to a number of international treaties and conventions that impose obligations to eliminate age discrimination.[89]

The Australian Human Rights Commission Act 1986 established the Australian Human Rights Commission and bestows on this Commission functions in relation to a number of international treaties and conventions that cover age discrimination.[89][90] During 1998-1999, 15% of complaints received by the Commission under the Act were about discrimination on the basis of age.[89]

Age discrimination laws at the national level were strengthened by the Age Discrimination Act 2004, which helps to ensure that people are not subjected to age discrimination in various areas of public life, including employment, the provision of goods and services, education, and the administration of Australian government laws and programs. The Act, however, does provide for exemptions in some areas, as well as providing for positive discrimination, that is, actions which assist people of a particular age who experience a disadvantage because of their age.[90]

In 2011, for the first time a position of Age Discrimination Commissioner was created within the Australian Human Rights Commission. The new Commissioner’s responsibilities include raising awareness among employers about the beneficial contributions that senior Australians as well as younger employees can make in the workforce.[91]

Every state in Australia has a probationary plate system for drivers. This is allowed because the Age Discrimination Act says that, in some circumstances, treating someone differently because of their age won’t be against the law. This is known as an exemption and includes
•things done in compliance with Commonwealth laws, including laws about taxation, social security and migration
•things done in compliance with state and territory laws
•certain health and employment programmes
•youth wages or direct compliance with industrial agreements and awards. [92]

Canada

In Canada, Article 718.2, clause (a)(i), of the Criminal Code defines as aggravating circumstances, among other situations, “evidence that the offence was motivated by … age”.[93][94]

Mandatory retirement was ended in Canada in December 2011,[95] but 74% of Canadians still consider age discrimination to be a problem.[96]

Nigeria

In November 2011, the Nigerian House of Representatives considered a bill which would outlaw age discrimination in employment.[97]

Philippines

At least two bills has been filed before the 16th Congress of the Philippines seeking to address age discrimination in employment in the country. The Blas Ople Policy Center, a non-government organization, asserts that responsibilities of making livelihood in a household has shifted to younger members of the family due to bias against hiring people older than 30 years of age. The organization also added that age discrimination contributes to the unemployment rate and acts as a hurdle to inclusive growth in the country. Overseas Filipino Workers returning from abroad seeking to find work in the country were tagged as vulnerable to age discrimination.[98][99]

United States

In the U.S., each state has its own laws regarding age discrimination, and there are also federal laws.[100] In California, the Fair Employment and Housing Act forbids unlawful discrimination against persons age 40 and older. The FEHA is the principal California statute prohibiting employment discrimination, covering employers, labor organizationsemployment agencies, apprenticeship programs and/or any person or entity who aids, abets, incites, compels, or coerces the doing of a discriminatory act. In addition to age, it prohibits employment discrimination based on race or color; religion; national origin or ancestry, disability, mental type or medical condition; marital status; sex or sexual orientation; and pregnancy, childbirth, or related medical conditions.[101] Although there are many protections for age-based discrimination against older workers (as shown above) there are less protections for younger workers.[citation needed]

In September 2016, California passed state bill AB-1687, an anti-ageism law taking effect on January 1, 2017, requiring “commercial online entertainment employment” services that allow paid subscribers to submit information and resumes (such as IMDB Pro), to honor requests to have their ages and birthdays removed. The bill was supported by SAG-AFTRA‘s former and current presidents Ken Howard and Gabrielle Carteris, who felt that the law would help to reduce ageism in the entertainment industry.[102] On February 23, 2017, Judge Vince Girdhari Chhabria issued a stay on the bill pending a further trial, claiming that it was “difficult to imagine how AB 1687 could not violate the First Amendment” because it inhibited the public consumption of factual information.[103]

The District of Columbia and twelve states define age as a specific motivation for hate crimes – California, Florida, Iowa, Hawaii, KansasLouisianaMaineMinnesotaNebraskaNew Mexico, New York and Vermont.[104][105]

The federal government governs age discrimination under the Age Discrimination in Employment Act of 1967 (ADEA). The ADEA prohibits employment discrimination based on age with respect to employees 40 years of age or older as well.[106] The ADEA also addresses the difficulty older workers face in obtaining new employment after being displaced from their jobs, arbitrary age limits.[107] The ADEA applies even if some of the minimum 20 employees are overseas and working for a US corporation.[108]

European Union

The European citizenship provides the right to protection from discrimination on the grounds of age. According to Article 21-1 of the Charter of Fundamental Rights of the European Unions:Charter of Fundamental Rights of the European Union#CHAPTER III. EQUALITY, “any discrimination based on any ground such as (…) age, shall be prohibited”.[109]

Additional protection against age discrimination comes from the Framework Directive 2000/78/EC. It prohibits discrimination on grounds of age in the field of employment.[110]

Germany

On 18 August 2006, the General Equal Treatment Act (Allgemeines Gleichbehandlungsgesetz, AGG) came into force. The aim of the AGG is to prevent and abolish discrimination on various grounds including age.[111]

A recent study suggested that youths in Germany feel the brunt of age discrimination.[112]

France

In France, Articles 225-1 through 225-4 of the Penal Code detail the penalization of Ageism, when it comes to an age discrimination related to the consumption of a good or service, to the exercise of an economic activity, to the labor market or an internship, except in the cases foreseen in Article 225-3.[113][114][115]

Belgium

In Belgium, the Law of 25 February 2003 “tending to fight discrimination” punishes Ageism when “a difference of treatment that lacks objective and reasonable justification is directly based on … age”. Discrimination is forbidden when it refers to providing or offering a good or service, to conditions linked to work or employment, to the appointment or promotion of an employee, and yet to the access or participation in “an economic, social, cultural or political activity accessible to the public” (Article 2nd, § 4). Incitement to discrimination, to hatred or to violence against a person or a group on the grounds of (…) age (Article 6) is punished with imprisonment and/or a fine.[116][117] Nevertheless, employment opportunities are worsening for people in their middle years in many of these same countries, according to Martin Kohli et al. in Time for Retirement (1991).

United Kingdom

Barbara Robb, founder of the British pressure group, Aid for the Elderly in Government Institutions (AEGIS), compiled Sans Everything: A Case to Answer, a controversial book detailing the inadequacies of care provided for older people, which prompted a nationwide scandal in the UK in 1976. Although initially official inquiries into these allegations reported that they were “totally unfounded or grossly exaggerated”,[118] her campaigns led to revealing of other instances of ill treatment which were accepted and prompted the government to implement NHS policy changes.[119]

However, in the UK, laws against ageism are new. Age discrimination laws were brought into force in October 2006,[120] and can now be found in the Equality Act 2010. This implements the Equal Treatment Framework Directive 2000/78/EC and protects employees against direct discrimination, indirect discriminationharassment and victimisation. There is also provision in the Equality Act 2010 to prohibit age discrimination in the provision of goods and services, though this has not yet been implemented by the current UK Coalition Government and will not be implemented before October 2012 at the earliest.[needs update][121]

Despite the relatively recent prohibition on age discrimination, there have already been many notable cases and official statistics show a 37% increase in claims in 2009/10[122] and a further 31% increase in 2010/11.[123] Examples include the case involving Rolls Royce,[124] the “Heyday” case brought by Age UK[125] and the recent Miriam O’Reilly case against the BBC.[126]

Recent research suggested that the number of age discrimination claims annually could reach 15,000 by 2015.[127]

The European Social Study survey in 2011 revealed that nearly two out of five people claim to have been shown a lack of respect because of their age. The survey suggested that the UK is riven by intergenerational splits, with half of people admitting they do not have a single friend over 70; this compares with only a third of Portuguese, Swiss and Germans who say that they do not have a friend of that age or older.[128] A Demos study in 2012 showed that three quarters of people in the UK believed there to be not enough opportunities for older and younger people to meet and work together.[129]

The “Grey Pride” campaign has been advocating for a Minister for Older People and its campaign has had some success, with Labour Leader Ed Miliband appointing Liz Kendall as Shadow Minister for Older People.[130]

The artist Michael Freedman, an outspoken advocate against age discrimination within the art world says that “mature students, like me, come to art late in life, so why are we penalised and demotivated? Whatever happened to lifelong learning and the notion of a flexible workforce?”[131]

Advocacy campaigns

Many current and historical intergenerational and youth programs have been created to address the issue of Ageism. Among the advocacy organizations created in the United Kingdom to challenge age discrimination are Age UK and the British Youth Council.

In the United States there have been several historic and current efforts to challenge Ageism. The earliest example may be the Newsboys Strike of 1899, which fought ageist employment practices targeted against youth by large newspaper syndicates in the Northeast. During the Franklin D. Roosevelt Administration, First LadyEleanor Roosevelt was active in the national youth movement, including the formation of the National Youth Administration and the defense of the American Youth Congress. She made several statements on behalf of youth and against Ageism. In one report entitled, “Facing the Problems of Youth,” Roosevelt said of youth,

“We cannot simply expect them to say, ‘Our older people have had experience and they have proved to themselves certain things, therefore they are right.’ That isn’t the way the best kind of young people think. They want to experience for themselves. I find they are perfectly willing to talk to older people, but they don’t want to talk to older people who are shocked by their ideas, nor do they want to talk to older people who are not realistic.”[132]

Students for a Democratic Society formed in 1960 to promote democratic opportunities for all people regardless of age, and the Gray Panthers was formed in 1970 by Maggie Kuhn, with a goal of eliminating Ageism in all forms.[133]Three O’Clock Lobby formed in 1976 to promote youth participation throughout traditionally ageist government structures in Michigan, while Youth Liberation of Ann Arbor started in 1970 to promote youth and fight Ageism.

Aid for the Elderly in Government Institutions (AEGIS) was a British pressure group that campaigned to improve the care of older people in long-stay wards of National Health Servicepsychiatric hospitals.[134][135] The group was founded by Barbara Robb in 1965,[135] and was active until Robb’s death in 1976.[136]

More recent U.S. programs include Americans for a Society Free from Age Restrictions, which formed in 1996 to advance the civil and human rights of young people through eliminating ageist laws targeted against young people, and to help youth counter Ageism in America.[137] The National Youth Rights Association started in 1998 to promote awareness of the legal and human rights of young people in the United States,[138] and the Freechild Project was formed in 2001 to identify, unify and promote diverse opportunities for youth engagement in social change by fighting Ageism.

Related campaigns

  • Director Paul Weitz reported he wrote the 2004 film, In Good Company to reveal how ageism affects youth and adults.[139]
  • In 2002 The Freechild Project created an information and training initiative to provide resources to youth organizations and schools focused on youth rights.[140]
  • In 2006 Lydia Giménez-LLort, an assistant professor of Psychiatry and researcher at the Autonomous University of Barcelona coined the term ‘Snow White Syndrome’ at the ‘Congrés de la Gent Gran de Cerdanyola del Vallès’ (Congress of the Elderly of Cerdanyola del Vallès, Barcelona, Spain) as a metaphor to define Ageism in an easier and more friendly way while developing a constructive spirit against it. The metaphor is based on both the auto-Ageism and adultocracy exhibited by the evil queen of the Snow White fairy tale as well as the social Ageism symbolized by the mirror[141]
  • Since 2008 ‘The Intergenerational Study’ by Lydia Giménez-LLort and Paula Ramírez-Boix from the Autonomous University of Barcelona is aimed to find the basis of the link between grandparents and grandsons (positive family relationships) that are able to minimize the Ageism towards the elderly. Students of several Spanish universities have enrolled in this study which soon will be also performed in USA, Nigeria, Barbados, Argentina and Mexico. The preliminary results reveal that ‘The Intergenerational study questionnaire’ induces young people to do a reflexive and autocritic analysis of their intergenerational relationships in contrast to those shown towards other unrelated old people which results very positive to challenge Ageism. A cortometrage about ‘The International Study’ has been directed and produced by Tomás Sunyer from Los Angeles City College[142]
  • Votes at 16 intends to lower the voting age in the United Kingdom to 16, reducing Ageism and giving 16-year-olds equal pay on the National Minimum Wage. The group claims that 16-year-olds get less money than older people for the same work, angering many 16-year-olds. They additionally postulate that 16-year-olds will have their voice listened to by older people more often.
  • Chilean director, Sebastian Lelio, is creating a U.S. version of his acclaimed 2013 film, “Gloria.”[143] The original film challenges the notion that as women age they become culturally ‘invisible’;[144] they may continue to be powerful, desirable, and sexually active. In the U.S. version, actress Julianne Moore will portray the lead character.[145]

Accusations of ageism

In a recent interview, actor Pierce Brosnan cited ageism as one of the contributing factors as to why he was not asked to continue his role as James Bond in the Bond film Casino Royale, released in 2006.[146]

Also, successful singer and actress Madonna spoke out in her 50s about ageism and her fight to defy the norms of society.[147] In 2015, BBC Radio 1 were accused of ageism after the station didn’t add her new single to their playlist. Similarly, Sex and the City star Kim Cattrall has also raised the issue of ageism.[148]

A 2007 Pew Research Center study found that a majority of American voters would be less likely to vote for a President past a given age[which?], with only 45% saying that age would not matter.[citation needed]

See also

References

https://en.wikipedia.org/wiki/Ageism

Age discrimination in the United States

From Wikipedia, the free encyclopedia

In 2007, the United States’ economy crashed, which affected many people. As a result, the unemployment rate within the U.S. has risen, with people over the age of 50 are facing record unemployment for their age group.[1] Factors that may affect employers’ decisions to hire or retain older workers include:

  • older workers may be more expensive to employ than younger ones,
  • older workers may lack up-to-date skills,
  • older workers may retire before an employer recovers hiring and training costs.

These concerns are mostly unfounded, but they are widespread.[2]

Benefits of employing older workers

Though companies may be reluctant to hire an elderly person, there are many benefits for an elderly person to have a job and be working. One benefit is that having a job can help decrease the mortality rate within the elderly.[3] In addition to living longer, one study found that the elderly that worked part-time had higher life satisfaction.[4]

In addition to the elderly benefiting from working, the companies employing elderly workers can also have several benefits. One study found that workforce professionals had stronger moral and ethical aptitudes, placed a greater importance on work in their lives, and disliked wasting time, more so than those of college students that were new in the working world.[5] In comparison to younger workers, elderly workers were found to be safer, have less counterproductive work behaviors, less work place aggression, less likely to abuse substances on the job, and less likely to be tardy to work.[6] Elderly workers also tend to be more loyal to a company and are able to use their previous work experience to help develop products, processes, and different approaches that help with organizational competitiveness.[7]

Age discrimination

People in the United States may start to contemplate retirement around the age of 60, when they become eligible for retirement benefits through the Social Security program. However, Social Security benefits are not generous, and absent other retirement savings or a pension plan, many Americans want or need to continue to work. Americans who seek Social Security benefits before reaching full retirement age will receive a reduced benefit.[1] Many retirees hold jobs to supplement their Social Security benefits.

According to studies, over the past few years the poverty rate for the group of people that range from 55–64 years old has increased from 8.6 to 9.4, which is the second largest increase for that group since August 1983.[8] One of the reasons that caused this increase in the poverty rate in the older generation is because they are oftentimes discriminated against by companies because of their age. Many companies find the older people as a group act as more of a cost than an asset to the company.[8] Some argue that younger people may discriminate against older workers because they don’t like them, or that they believe older workers are not motivated or lack current job skills.[8]

Most companies choose to offer health care and insurance to all of their employees. The older generation workers often require more benefits from the company due to their age. One worker at the age of 58 who was a two-time cancer survivor and also had fibromyalgiawas laid-off and replaced with a younger girl that was half her age.[8] Although the woman couldn’t prove it, she believed that she was fired and replaced because of her age and the costs that the company incurred by having her as an employee. As a result, because older people are more likely to have health concerns and issues, they are many times the first to be cut from a company. While many age discrimination claims have been filed and have increased drastically, they are very hard to prove and charge against a company.[8]

In order to reduce age discrimination in the United States, Congress passed the Age Discrimination in Employment Act of 1967 (ADEA), a law that provides certain employment protections to workers who are over the age of forty, who work for an employer who has twenty or more employees. For protected workers, the ADEA prohibits discrimination at all levels of employment, from recruitment and hiring, through the employment relationship, and through decisions for layoffs or termination of the employment relationship.[9]

Studies

One researcher decided to make an experiment to test if age discrimination actually exists. For the experiment she created 4,000 mock female résumés and sent them to different companies throughout Boston, Massachusetts as well as St. Petersburg, Florida.[2] Each résumé included the date that the fictitious applicant graduated from high school which indicated the age of each person to the company. The ages of each applicant on the résumés ranged from 35 to 62 years old. The results of the study showed that a younger person was 40 percent more likely to be hired than an older applicant of 50 years or older at the designated companies. As a result, the study proved that companies do often age discriminate against specific groups, especially the older generation.[2]

Another study found that it is not uncommon for employers to use stereotypes to rationalize discriminating against hiring elderly workers. The first of which is the employees’ salary expectations. If an older worker had a job before that had a higher salary, then he/she might keep looking for another job that has a high salary, so hiring him/her is a waste of time to the company. A second reason is that the elderly worker often will have a younger boss, so employers think that the older employee will not be satisfied working for someone who is younger or less experienced.[10]

Causes

There are many reasons for the workplace age discrimination. People are living longer because of healthier lifestyles and advances in medicine. People are working longer because the mandatory retirement age has been eliminated, the recent poor economy has diminished savings and there has been a decline in benefit retirement plans. Thus, more older people are interested in seeking and holding employment.

There are many reasons why older workers may have a difficult time finding work after being laid-off. Many older workers were employed by the same employer for many years, and in some cases that may have been their only job during their entire career.[1] Many older workers are less likely to be skilled at job-seeking, as they haven’t had to search for employment in many years.[1] Also, as the years have passed, companies have turned to more efficient means by offering applications only online. However, while the current generation relies on technology, many older workers may be accustomed to older methods of performing the same labor. Some may find it difficult to use a computer, whether to find and apply for jobs or in the workplace.[1]

Because many of the people in the older generation are less likely to have skills on the computer, their technological inabilities also hold them back from being hired.[1] As the years have passed, many companies have begun to focus using the internet and other programs on the computer, making it more likely they will hire a younger worker that is capable of using technology over an older person that doesn’t know how.[1] This lack of knowledge means that companies would have to provide more training for the elderly person than they would often have to provide for a younger employee. This can be costly and time consuming for companies.[11] Older adults often resist the use of computers for various reasons, such as impaired eyesight and hearing, arthritis and other physical ailments, and reduced cognitive skills, including memory loss and short attention spans, which make surfing the Web more challenging. Learning how to effectively utilize new technology for the elderly can be more demanding due to the fact that learning new skills is stressful both mentally and physically.[12]

The unemployment issue among the older generation not only creates problems for the specific age group, but it also causes policy issues around the nation.[8] The government makes decisions on how to solve the crisis because with this group of people out of work, the older generation is unable to be self-sufficient during a large part of their adult life; a time when they are more likely to have health issues.[8] Also, these people are nearing the time when they will no longer be able to work, and may not be prepared or have the financial means to take care of themselves. As a result, policy makers must try to solve the issue of unemployment by creating more jobs. However, they also must try to create a policy that offers benefits for the older people that are unemployed because they are more likely to be unemployed longer than others.[2]

Solutions

A common solution to become qualified for more jobs and have more opportunities to exit unemployment is to go back to school, whether that is high school or college.[13] Many of the older people do not have a complete high school or college education; therefore, and as a result they do not have the correct training for many jobs that are currently available.[13] However, many older people have found that returning to school would force them to incur more costs than they would if they didn’t go back to school. Taking a class at a local college could cost several thousand dollars. If a person is only a few years away from reaching the age of retirement, they may find it less costly to endure a poor standard of living for a few years and then get their Social Security instead of using part of their limited resources for classes that may never offer them any aid.[13] Another solution for the older generation to become qualified for more jobs is to take instructional courses on how to use computers. Instructional courses may need to incorporate varied instructional styles such as introducing new material and building on prior knowledge by using direct instruction followed by opportunities to integrate and practice new information. Instructors must understand how to best deliver instruction to senior learners in order to provide effective, engaging instruction. Ideal learning environments are ones that are flexible and sensitive to the needs of the senior learner. Once older people gain the skills to use a computer, they will have a greater chance of being hired for a job.[14] An alternative solution is to move to areas of the country that have a better job market. However, older people are more likely to own more assets such as land and their houses. As a result, it would be more difficult and possibly less beneficial for an older person to move and leave these behind.

References

  1. Jump up to:a b c d e f g Rich, Motoko. “For the Unemployed Over 50, Fears of Never Working Again.” The New York Times. 2010 Sept. 19 https://www.nytimes.com/2010/09/20/business/economy/20older.html?pagewanted=all. 3 Dec. 2011.
  2. Jump up to:a b c d Miller, Mark (14 January 2011). “Older unemployed workers half as likely to get hired”. Retrieved 28 September2017.
  3. Jump up^ Blanc, P. D., Katz, P., & Yelin, E. (1996). Mortality risk among elderly workers. “American Journal of Industrial Medicine”, 543-547.
  4. Jump up^ Chang, H., & Yen, S. T. (2011). Full-time, part-time employment and life satisfaction of the elderly. “The Journal of Socio-Economics”, 40(6), 815-823.
  5. Jump up^ Van Ness, R. K., Melinsky, K., Buff, C. L., & Seifert, C. F. (2010). Work ethic: Do new employees mean new work values?. “Managerial Issues”, 22(1), 10-34.
  6. Jump up^ Ng, T. W. H., & Feldman, D. C. (2008). The relationship of age to ten dimensions of job performance. “Journal of Applied Psychology”, 93(2), 392-423.
  7. Jump up^ Shultz, K. S., Olson, D. A., & Wang, M. (2011). Overqualified employees: Perspectives of older workers. “Industrial & Organizational Psychology”, 4(2), 247-249.
  8. Jump up to:a b c d e f g James, Susan. “Unemployment: Companies Cut Pricey Older Workers.” ABC News. 2009 10 Mar. http://abcnews.go.com/Business/Story?id=7042634&page=1. 30 Nov. 2011.
  9. Jump up^ Larson, Aaron (25 July 2016). “Age Discrimination Law”ExpertLaw. Retrieved 28 September 2017.
  10. Jump up^ Roscigno, V. J., Mong, S., Byron, R., & Tester, G. (2007). Age discrimination, social closure and employment. “Social Forces”, 86(1), 313-334.
  11. Jump up^ Brandon, E. “Why Older Workers Can’t get Hired.” http://money.usnews.com/money/blogs/planning-to-retire/2012/05/18/why-older-workers-cant-get-hired
  12. Jump up^ Cohen, Aaron M. “Wiring the Elderly.” Futurist. 2010.
  13. Jump up to:a b c “Unique Training Requirements of Low-Income, Older Workers.” U.S. Department of Labor.2010 7 Jan. http://www.doleta.gov/Seniors/html_docs/docs/unique1.cfm. 1 Dec. 2011.
  14. Jump up^ “Instructional Styles, Attitudes And Experiences Of Seniors In Computer Workshops” Educational Gerontology.2010.
  • Butler, T., & Berret, B. (2011). A generation lost: the reality of age discrimination in today’s hiring practices. Journal of Management and Marketing Research, 9, 1-11. Academic Search Complete. Web. 21 Sept. 2013.

https://en.wikipedia.org/wiki/Age_discrimination_in_the_United_States

Story 2: 2 Out of 3 Americans Are Overweight or Obese — President Trump Joins The Huge Fluffy Majority — Videos

See the source image

See the source image

Overweight World – Obesity Facts and Statistics

What is obesity? – Mia Nacamulli

Obesity in America

Normal Weight, Yet Still Obese?

Top 10 FATTEST COUNTRIES in the World

Fluffy on British People

“The President” – Gabriel Iglesias (from my I’m Not Fat… I’m Fluffy comedy special)

“Road Trip” – Gabriel Iglesias- (From Hot & Fluffy comedy special)

The Best Time to Eat to Lose Weight

Keto and Intermittent Fasting: the Big Overview for Beginners

Acceptable Liquids with Intermittent Fasting

The Ketogenic Diet & Dairy (Milk, Yogurt & Cheese)

What Are The 4 Body Types?

Body Type l What Is My Shape l How to Find Your Body Type l Mesomorph l Take the Quiz

What to Eat for Your Body Type?

Adrenal Body Type, Cortisol & Belly Fat!

How to Lose Belly Fat: FAST!

The Fastest Way to Lose Weight: MUST WATCH!

Rid the Loose Flabby Skin!

The 2 Most DANGEROUS Foods: MUST WATCH!

The 7 Foods You Must NEVER Ever Eat!

The Perfect Diet

Gabriel Iglesias I’m Sorry for What I Said When I Was Hungry 2017 (Stand Up Comedy, with SUBTITLES)

Story 3: President Trump’s Fake News Awards of 2017 — Big Lie Media’s Junk Journalism Progressive Propaganda Exposed — Videos

See the source image

Trump’s ‘Fake News’ award winners are …

Two of Trump fake news award winners are financial stories

Michelle Malkin and Joe Concha react to ‘Fake News Awards’

FULL VIDEO Of President Trump’s Fake News Awards

Fake News Awards & TRUMP PRESS CONFERENCE Rebutting CNN, MSNBC, ABC, New York Times, etc…

The Fake News Awards 2017

#Trump Gaslights and Psychs Out the #MSM Yet Again and They Took the Bait Hook, Line and Sinker

 

The Highly-Anticipated 2017 Fake News Awards

TEAM GOP – January 17, 2018

2017 was a year of unrelenting bias, unfair news coverage, and even downright fake news. Studies have shown that over 90% of the media’s coverage of President Trump is negative.

Below are the winners of the 2017 Fake News Awards.

1. The New York Times’ Paul Krugman claimed on the day of President Trump’s historic, landslide victory that the economy would never recover.


2. ABC News’ Brian Ross CHOKES and sends markets in a downward spiral with false report.



3. CNN FALSELY reported that candidate Donald Trump and his son Donald J. Trump, Jr. had access to hacked documents from WikiLeaks.


(via Fox News)
4. TIME FALSELY reported that President Trump removed a bust of Martin Luther King, Jr. from the Oval Office.


5. Washington Post FALSELY reported the President’s massive sold-out rally in Pensacola, Florida was empty. Dishonest reporter showed picture of empty arena HOURS before crowd started pouring in.

View image on TwitterView image on TwitterView image on TwitterView image on Twitter

.@DaveWeigel @WashingtonPost put out a phony photo of an empty arena hours before I arrived @ the venue, w/ thousands of people outside, on their way in. Real photos now shown as I spoke. Packed house, many people unable to get in. Demand apology & retraction from FAKE NEWS WaPo!

6. CNN FALSELY edited a video to make it appear President Trump defiantly overfed fish during a visit with the Japanese prime minister. Japanese prime minister actually led the way with the feeding.


7. CNN FALSELY reported about Anthony Scaramucci’s meeting with a Russian, but retracted it due to a “significant breakdown in process.”


(via washingtonpost.com)
8. Newsweek FALSELY reported that Polish First Lady Agata Kornhauser-Duda did not shake President Trump’s hand.


9. CNN FALSELY reported that former FBI Director James Comey would dispute President Trump’s claim that he was told he is not under investigation.


10. The New York Times FALSELY claimed on the front page that the Trump administration had hidden a climate report.


(via WashingtonPost.com)

11. And last, but not least: “RUSSIA COLLUSION!” Russian collusion is perhaps the greatest hoax perpetrated on the American people. THERE IS NO COLLUSION!

Well, now that collusion with Russia is proving to be a total hoax and the only collusion is with Hillary Clinton and the FBI/Russia, the Fake News Media (Mainstream) and this phony new book are hitting out at every new front imaginable. They should try winning an election. Sad!

 

While the media spent 90% of the time focused on negative coverage or fake news, the President has been getting results:

1. The economy has created nearly 2 million jobs and gained over $8 trillion in wealth since the President’s inauguration.

2. African Americans and Hispanics are enjoying the lowest unemployment rate in recorded history.

3. The President signed historic tax cuts and relief for hardworking Americans not seen since President Reagan.

4. President Trump’s plan to cut regulations has exceeded “2 out for every 1 in” mandate, issuing 22 deregulatory actions for every one new regulatory action.

5. The President has unleashed an American energy boom by ending Obama-era regulations, approving the Keystone pipeline, auctioning off millions of new acres for energy exploration, and opening up ANWR.

6. ISIS is in retreat, having been crushed in Iraq and Syria.

7. President Trump followed through on his promise to recognize Jerusalem as the capital of the State of Israel and instructed the State Department to begin to relocate the Embassy.

8. With President Trump’s encouragement, more member nations are paying their fair share for the common defense in the NATO alliance.

9. Signed the Veterans Accountability and Whistleblower Protection Act to allow senior officials in the VA to fire failing employees and establishes safeguards to protect whistleblowers.

10. President Trump kept his promise and appointed Associate Justice Neil Gorsuch to the U.S. Supreme Court.

https://gop.com/the-highly-anticipated-2017-fake-news-awards/

 

A Times Square billboard that “The Late Show With Stephen Colbert” bought to nominate itself for President Trump’s “Fake News Awards.” CreditMike Segar/Reuters

WASHINGTON — President Trump — who gleefully questioned President Barack Obama’s birthplace for years without evidence, long insisted on the guilt of the Central Park Five despite exonerating proof and claimed that millions of illegal ballots cost him the popular vote in 2016 — wanted to have a word with the American public about accuracy in reporting.

On Wednesday, after weeks of shifting deadlines, and cryptic clues, Mr. Trump released his long-promised “Fake News Awards,” an anti-media project that had alarmed advocates of press freedom and heartened his political base.

“And the FAKE NEWS winners are …,” he wrote on Twitter at 8 p.m.

The message linked, at first, to a malfunctioning page on GOP.com, the Republican National Committee website. An error screen read: “The site is temporarily offline, we are working to bring it back up. Please try back later.”

When the page came back online less than an hour later, it resembled a Republican Party news release. Headlined “The Highly Anticipated 2017 Fake News Awards” and attributed to “Team GOP,” it included a list of Trump administration accomplishments and jabs at news organizations presented in the form of an 11-point list.

The “winners” were CNN, mentioned four times; The New York Times, with two mentions; and ABC, The Washington Post, Time and Newsweek, with one mention apiece.

Taken as a whole, Mr. Trump’s examples of grievances came as no surprise to anyone who has read his complaints about the media on Twitter.

The various reports singled out by Mr. Trump touched on serious issues, like the media’s handling of the investigation by the special counsel Robert S. Mueller III into the Trump campaign’s possible ties to Russia, and frivolous matters, like the manner in which journalists conveyed how the president fed fish during a stop at a koi pond on his visit to Japan.

The first item on the list referred not to a news article but to a short opinion piece posted on The Times’s website at 12:42 on the night Mr. Trump became president: “The New York Times’ Paul Krugman claimed on the day of President Trump’s historic, landslide victory that the economy will ‘never’ recover,” the entry read.

What Mr. Krugman actually wrote was this: “If the question is when markets will recover, a first-pass answer is never.” Mr. Krugman concluded his election night take by predicting that a global recession was likely, while adding the caveat, “I suppose we could get lucky somehow.”

Three days later, Mr. Krugman retracted his prediction of an economic collapse, saying he overreacted.

The next target was Brian Ross of ABC News, who was suspended by the network last month because of an erroneous report.

Photo

President Trump’s tweet linked, at first, to a malfunctioning page on GOP.com, the Republican National Committee website.

ABC apologized for and corrected Mr. Ross’s report that Michael T. Flynn, the former national security adviser, planned to testify that Mr. Trump had directed him to make contact with Russian officials when Mr. Trump was still a candidate.

In fact, Mr. Trump had directed Mr. Flynn to make contact after the election, when he was president-elect.

At the time of Mr. Ross’s suspension, Kathleen Culver, the director of the Center for Journalism Ethics at the University of Wisconsin-Madison, said that the president was likely to use the mistake as ammunition against his political opponents — an observation that seemed borne out by the “Fake News Awards.”

The third entry on the GOP.com list went after CNN, a favorite target of the president, for reporting incorrectly last month that the president’s eldest child, Donald Trump Jr., had received advance notice from WikiLeaks about a trove of hacked documents that it planned to release during last year’s presidential campaign.

In fact, the email to the younger Mr. Trump was sent a day after the documents, stolen from the Democratic National Committee, were made available to the general public. The correction undercut the main thrust of CNN’s story, which had been seized on by critics of the president as evidence of coordination between WikiLeaks and the Trump campaign.

Another entry on the list took on The Washington Post, claiming that it had “FALSELY reported the President’s massive sold-out rally in Pensacola, Florida was empty. Dishonest reporter showed picture of empty arena HOURS before crowd started pouring in.”

The reporter in question was David Weigel, who had posted the photo in question on his Twitter account before quickly deleting it. The Post itself did not publish the photo or a report on the size of the crowd at the Trump event. The “Fake News Awards” entry, however, conflated a reporter’s tweetwith the publication itself. It also omitted the fact that Mr. Weigel deleted his tweet and apologized for it when it was pointed out to him that it was misleading. Further, it did not mention that Mr. Trump had called for Mr. Weigel to be fired over the tweet. (He was not.)

The content of the 11-point list was perhaps less notable than its premise: a sitting president using his bully pulpit for a semi-formalized attack on the free press.

In two subsequent tweets on Wednesday night, Mr. Trump added that there were “many great reporters I respect” and defended his administration’s record in the face of “a very biased media.”

The technical anticlimax seemed a fitting end to a peculiar saga that began in November when Mr. Trump floated the bestowing of a “FAKE NEWS TROPHY.”

The idea matured into the “Fake News Awards,” which the president initially said in a Jan. 2 Twitter post he would give out on Jan. 8 to honor “the most corrupt & biased of the Mainstream Media.”

With the date approaching, Mr. Trump wrote on Twitter that the event would be moved to Wednesday because “the interest in, and importance of, these awards is far greater than anyone could have anticipated!”

Photo

Sarah Huckabee Sanders, the White House secretary, on Wednesday, hours before the awards were announced. “I know you’re all waiting to see if you are big winners, I’m sure,” she told reporters. CreditDoug Mills/The New York Times

From the beginning, the awards were the sort of Trumpian production that seemed easy to mock but difficult to ignore. Members of the news media joked about the speeches they would prepare, the tuxedos and gowns they would fetch. It would be an honor, they said, just to be nominated.

Here, it seemed, was the opéra bouffe climax of Mr. Trump’s campaign against the media, a bizarro-world spectacle that both encapsulated and parodied the president’s animus toward a major democratic institution.

Late-night comedy shows created satirical Emmys-style advertising campaigns to snag what some referred to as a coveted “Fakey.”

“The Late Show With Stephen Colbert” bought a billboard in Times Square, nominating itself in categories like “Least Breitbarty” and “Corruptest Fakeness.” Jimmy Kimmel, who has emerged as a Trump bête noire, called it “the Stupid People’s Choice Awards.”

Politico reported that the awards could even pose an ethical issue for White House aides, with some experts arguing that the event would breach a ban on government officials using their office to explicitly promote or deride private organizations.

And press advocates cringed at the prospect of a gala dedicated to the phrase “fake news,” which has already helped corrode trust in journalism in the United States and around the world. In response to Mr. Trump’s endeavor, the Committee to Protect Journalists this month recognized the president among the “world leaders who have gone out of their way to attack the press and undermine the norms that support freedom of the media.”

Two Republicans from Arizona, Senator John McCain and Senator Jeff Flake, denounced Mr. Trump’s anti-press attacks, with Mr. Flake noting in a speech on the Senate floor on Wednesday that the president had borrowed a term from Stalin to describe the media: “enemy of the people.”

The buzz around the president’s latest anti-press stunt has contributed to a larger shift in American attitudes toward the press.

In a study released this week by Gallup and the Knight Foundation, 66 percent of Americans who were surveyed said most news organizations blurred opinion and fact, up from 42 percent in 1984. “Fake news” was deemed a threat to democracy by a majority of respondents.

Mr. Trump’s list did not mention BuzzFeed, a media outlet that drew his ire last year when it published a salacious and largely unsubstantiated intelligence dossier that purported to lay out how Russia had aided the Trump campaign. On Jan. 8, President Trump’s longtime lawyer, Michael D. Cohen, filed a defamation lawsuit in federal court against Fusion GPS, the firm behind the report, as well as a separate lawsuit against BuzzFeed in state court.

Mr. Trump also did not mention Michael Wolff, the author of the slashing, if error-specked, best seller, “Fire and Fury: Inside the Trump White House,” although a lawyer working on his behalf had sent a letter demanding that the publisher Henry Holt and Company halt publication of the book.

“Fire and Fury” did not come out until Jan. 5, so perhaps the author will receive a prominent mention next January, if the president sees fit to give out the 2018 Fake News Awards.

The Pronk Pops Show Podcasts Portfolio

 

Listen To Pronk Pops Podcast or Download Shows 1017-1018

Listen To Pronk Pops Podcast or Download Shows 1010-1016

Listen To Pronk Pops Podcast or Download Shows 1001-1009

Listen To Pronk Pops Podcast or Download Shows 993-1000

Listen To Pronk Pops Podcast or Download Shows 984-992

Listen To Pronk Pops Podcast or Download Shows 977-983

Listen To Pronk Pops Podcast or Download Shows 970-976

Listen To Pronk Pops Podcast or Download Shows 963-969

Listen To Pronk Pops Podcast or Download Shows 955-962

Listen To Pronk Pops Podcast or Download Shows 946-954

Listen To Pronk Pops Podcast or Download Shows 938-945

Listen To Pronk Pops Podcast or Download Shows 926-937

Listen To Pronk Pops Podcast or Download Shows 916-925

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows 151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Advertisements
Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 853, March 8, 2017, Story 1: Republicans United For Clean Repeal of Obamacare and Divided On Obamacare Replacement — Conservatives, Classical Liberals and Libertarians Oppose House Rollover Republican Ryancare — CATO Institute, Club for Growth, Freedom Works Heritage Foundation and House Freedom Caucus, Republican Study Committee and American People All Oppose Obamacare 2.0 Lite — Support Senator Rand Paul’s Bill and Freedom Caucus — Negotiate — Negotiate — Negotiate — Videos — Story 2: Wikileaks Vault 7 Release Reveals CIA’s Collection of Hacking Tools and Malware of Secret Surveillance Spying Security State (S5) — Intelligence Community Are Listening and Watching — George Orwell Was An Optimist — Two Party Turnkey Tyranny — Videos -_

Posted on March 8, 2017. Filed under: Addiction, American History, Animal, Benghazi, Blogroll, Breaking News, Communications, Congress, Constitutional Law, Corruption, Countries, Culture, Defense Spending, Donald J. Trump, Donald Trump, Elections, Fast and Furious, Government, Government Dependency, Government Spending, Hate Speech, Health, Health Care, Health Care Insurance, Hillary Clinton, History, House of Representatives, Human Behavior, Illegal Immigration, Illegal Immigration, Immigration, Independence, Iran Nuclear Weapons Deal, Islam, Law, Legal Immigration, Life, Lying, Medicare, Obama, Philosophy, Photos, Politics, Polls, Progressives, Rand Paul, Raymond Thomas Pronk, Religion, Scandals, Science, Security, Senate, Social Science, Social Security, Socials Security, Spying, Taxation, Taxes, Terror, Terrorism, Unemployment, Videos, Violence, War, Wealth, Weather, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Pronk Pops Show 812: December 12, 2016

Pronk Pops Show 811: December 9, 2016

Pronk Pops Show 810: December 8, 2016

Pronk Pops Show 809: December 7, 2016

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

 

Story 1: Republicans United For Clean Repeal of Obamacare and Divided On Obamacare Replacement — Conservatives, Classical Liberals and Libertarians Oppose House Rollover Republican Ryancare — CATO Institute, Club for Growth, Freedom Works Heritage Foundation and House Freedom Caucus,  Republican Study Committee and American People  All Oppose Obamacare 2.0 Lite — Support Senator Rand Paul’s Bill and Freedom Caucus — Negotiate — Negotiate — Negotiate — Videos — 

Image result for cartoons on repeal and repace obamacare

Image result for cartoon branco republican repeal and replace obamacare

Image result for vault 7 cia

Image result for cartoons on obamacare

Conservative Freedom Caucus Torpedoes GOP Obamacare Replacement

MAJOR: Paul Ryan Introduces American Health Care Act, House GOP’s Obamacare Replacement

SABOTAGE! WHAT PAUL RYAN JUST DID TO TRUMPCARE PROVES HE’S A TRAITOR TO THE PRESIDENT

Speaker Paul Ryan: There isn’t chaos in GOP-led Congress

SEAN HANNITY INTERVIEWS TOM PRICE ABOUT TRUMP’S NEW HEALTHCARE PLAN – 3/7/17

Trump’s HHS Secretary On Obamacare Replacement Bill

Ingraham takes issue with GOP’s health care replacement bill

Herman Cain on Obamacare replacement bill: Consumers now back in charge

Laffer: Obamacare replacement bill worth 2,000-3,000 points on the Dow

President Trump Holds Meeting On Obamacare Replacement with House Deputy Whip Team 3/7/17

GOP releases Obamacare replacement details

York: Fate of GOP health care bill lies with Freedom Caucus

Republicans unveil Obamacare replacement

Trump backs healthcare tax credit amid conservative opposition

Sen. Rand Paul unveils ObamaCare replacement plan

Conservatives lash out at House GOP’s Obamacare replacement bill

March 7 at 3:01 PM
Influential conservative lawmakers and activist groups panned health-care legislation drafted by House Republican leaders Tuesday, throwing the GOP’s plan to undo the Affordable Care Act in serious doubt less than 24 hours after it was released.Those groups dubbed the House bill, backed by House Speaker Paul D. Ryan (R-Wis.), as “Obamacare Lite,” “RyanCare” or “RINOcare” — a reference to “Republican in name only,” a popular conservative epithet for establishment politicians.The Ryan-backed bill offers a more conservative vision for the nation’s health-care system, replacing federal insurance subsidies with a new form of individual tax credits and phasing out most of the ACA’s taxes. But key lawmakers and outside groups, who can rile up the party’s base against legislative plans, said the legislation does not go far enough in pulling back elements of President Barack Obama’s overhaul.“The House Republican proposal released last night not only accepts the flawed progressive premises of Obamacare but expands upon them,” Michael Needham, the head of Heritage Action for America, said in a statement Tuesday. “Congressional Republicans should fully repeal the failed law and begin a genuine effort to deliver on longstanding campaign promises that create a free market health care system.”Two other groups, FreedomWorks and the Club for Growth, decried the plans Tuesday as a betrayal of campaign promises.

A day after House Republicans released a plan to supplant the Affordable Care Act, Sen. Rand Paul (R-Ky.) outlined the issues he has with their proposal, indicating it might be unconstitutional. (Alice Li, Jayne Orenstein/The Washington Post)

“If this warmed-over substitute for government-run health care remains unchanged, the Club for Growth will key vote against it,” said the group’s president, David McIntosh, referring to a process in which lawmakers are graded on their votes, the better to use them as ammunition on the campaign trail.

The dilemma Republican congressional leaders face is, if they change the legislation to appease hard-line conservatives, they are likely to alienate more-moderate members who are wary of disrupting insurance markets and taking coverage away from those who gained it under the ACA.

The margin for dissent is slim: Assuming no Democrats break ranks to support the bill, for the overhaul to pass, Republicans can lose only 21 votes in the House and two votes in the Senate.

CONTENT FROM WELLS FARGO ADVISORS
Keep these factors in mind when planning for retirement
Understanding the risks that can come between you and the retirement you want is an important step toward meeting your goals.

Four key Republicans in the Senate have expressed worries about the plan’s possible impact on lower-income people who received Medicaid coverage through the ACA’s expansion of that program. The four senators are split on exactly what proposals would meet their standards, but none are likely to support the course of action favored by many conservatives — passing a 2015 bill that repealed key ACA provisions without immediately including replacement provisions.

There were some signs of hope for the House plan Tuesday. President Trump offered an early boost to GOP leaders with a morning tweet: “Our wonderful new Healthcare Bill is now out for review and negotiation. ObamaCare is a complete and total disaster — is imploding fast!”

Vice President Pence attended a Senate Republican policy luncheon Tuesday and, in a break with normal practice, joined Senate Majority Leader Mitch McConnell and other GOP leaders at a news conference afterward to defend the House approach as “the framework for reform.”

“We are certainly open to improvements and recommendations in the legislative process, but this is the bill, and the president supports the American Health Care Act,” he said. “We are looking forward to working very directly with leadership in the House and the Senate in the weeks ahead. We are very confident that the American Health Care Act, with their help, will be on the president’s desk.”

In another sign of the administration’s support, Health and Human Services Secretary Tom Price sent a letter Tuesday to the chairmen of the two House committees processing the legislation, calling it a “necessary and important first step toward fulfilling our promises to the American people.”

But Price, who authored a similar ACA replacement proposal when he served in the House, said that achieving all of Trump’s health-care goals “will require more than what is possible” in the current legislation, which is limited in its scope to take advantage of special budget rules allowing for easier Senate passage.

He specifically mentioned allowing insurance to be sold across state lines, pharmaceutical cost reductions and “medical legal reforms,” an apparent reference to long-standing GOP proposals to limit malpractice liability.

Senate Majority Leader Mitch McConnell (R-Ky.) offered measured support for the proposed legislation and said he would bring it to the Senate floor should it pass the House.

“I encourage every member to review [the legislation] because I hope to call it up when we receive it from the House,” McConnell said Tuesday on the Senate floor. “We’ve come a long way. We’ve got a lot further to go, but we’re making significant progress. Working arm in arm with the House and the new administration, we’re going to keep our promise to the American people.”

While some of the fiercest criticism came from hard-right activist groups that have dogged Republican congressional leaders for years, other more establishment-minded organs joined the chorus of dissent.

National Review published an editorial Tuesday that said the legislation was “a disappointment” and has “serious flaws even as a first step toward full repeal and replacement.”

Republicans, the influential conservative magazine said, “would be better off rallying behind a bill in which they really believe, even if Democrats kill it with a filibuster,than trying and failing to enact a bill that they support only tepidly.”

Leaders involved in drafting the bills sought to defend their plan against the onslaught of criticism, describing it as the product of months of internal discussions and saying its details could still change.

“We now have a bill that’s available for all to read,” said Rep. Greg Walden (R-Ore.), chairman of the House Energy and Commerce Committee, which helped craft one of them, at a news conference Tuesday. “I’d encourage them to do it. I’d encourage them to look against their own bills and what they’ve supported in the past. And then let’s have a thoughtful legislative discussion.”

Rep. Kevin Brady (R-Tex.), chairman of the House Ways and Means Committee, which produced the other bill, said: “As Republicans, we have a choice. We can act now, or we can keep fiddling around and squander this opportunity to repeal Obamacare and begin a new chapter of freedom for the American people. House Republicans are choosing to act now.”

Still, agitation among conservatives was evident Monday night and poured into Tuesday.

CONTENT FROM WELLS FARGO ADVISORS
Keep these factors in mind when planning for retirement
Understanding the risks that can come between you and the retirement you want is an important step toward meeting your goals.

“Keep the ‘Cadillac’ tax in place? Keep Medicaid in place until 2020?” said Rep. Jim Jordan (R-Ohio), a co-founder of the House Freedom Caucus, referring to high-priced health-care plans. “We didn’t have Medicaid expansion in the bill we sent to President Obama, but we have it in the one we send to President Trump? That makes no sense to me.”

“Obamacare 2.0,” tweeted Rep. Justin Amash (R-Mich.), a libertarian who frequently breaks with GOP leadership.

Under two bills drafted by separate House committees, the government would no longer penalize Americans for failing to have health insurance but would try to encourage people to maintain coverage by allowing insurers to impose a 30 percent surcharge for those who do not have continuous coverage.

The legislation would preserve two of the most popular features of the 2010 health-care law, letting young adults stay on their parents’ health plans until age 26 and forbidding insurers to deny coverage or charge more to people with preexisting medical problems. It would also target Planned Parenthood, rendering the women’s health organization ineligible for Medicaid reimbursements or federal family -planning grants — a key priority for antiabortion groups.

Taken together, the bills introduced Monday represent the Republicans’ first attempt — and best shot to date, with an ally in the White House — to translate into action seven years of talking points about demolishing the ACA.

At the same time, major aspects of the House GOP plan reflect the treacherous terrain that Republicans face to win enough votes within their own conferences in the GOP-controlled House and Senate.

The bills must address concerns of both conservatives worried about the plan’s cost and the notion it might enshrine a new federal entitlement, as well as more moderate members who want to ensure that their constituents, including those who received coverage under the ACA’s Medicaid expansion, retain access to affordable health care.

The Freedom Caucus, a block of roughly 30 House hard-liners who criticized earlier versions of the bill, is set to meet Tuesday night to discuss the health-care bill and perhaps develop a list of demands to present to GOP leaders.

Members of the Republican Study Committee, a larger conservative group, were already critical of key elements of the plan. “This is a Republican welfare entitlement,” reads an RSC analysis distributed late Monday, addressing the inclusion of refundable tax credits in the plan.

With no Democrats expected to vote to pass the bill and four House GOP seats vacant, Republicans can afford to lose no more than 21 members in the lower chamber.

In recognition of the close vote that is expected, House Majority Whip Steve Scalise (R-La.) and several deputy whips are expected to visit the White House Tuesday afternoon to discuss the health-care bill with Trump administration officials.

On Tuesday morning, Trump signaled the work on the proposal was not completely finished, referring to selling insurance across state lines and saying that change would come in “phase 2 & 3 of healthcare rollout.” The president also said he was “working on new system where there will be competition in the Drug Industry” that will lead prices to “come way down.”

Conservative critics of the measure had noted the plan’s exclusion of selling insurance across state lines. “The problems with this bill are not just what’s in it, but also what’s missing,” said McIntosh.

Yet attacks from the right were not the only challenge facing Republican leaders.

Four key Republican senators, all from states that opted to expand Medicaid under the ACA, said they would oppose any new plan that would leave millions of Americans uninsured.

“We will not support a plan that does not include stability for Medicaid expansion populations or flexibility for states,” Sens. Rob Portman (Ohio), Shelley Moore Capito (W.Va.), Cory Gardner (Colo.) and Lisa Murkowski (Alaska) wrote in a letter to McConnell on Monday.

The plan from House Republicans would substantially redesign Medicaid with the goal of balancing the GOP’s antipathy toward the ACA’s expansion of the program against the concerns of a significant cadre of Republican governors — and the lawmakers from their states — who fear losing millions of dollars that the law has funneled to help insure low-income residents.

Democrats, meanwhile, have given no indication that they intend to work with Republicans, and top party leaders decried the GOP plan Monday as a betrayal of everyday Americans. “Trumpcare doesn’t replace the Affordable Care Act, it forces millions of Americans to pay more for less care,” said Senate Minority Leader Charles E. Schumer (D-N.Y.).

In particular, the plan to target Planned Parenthood has already generated fierce pushback from Democrats and doubts from some Republicans who have noted that federal funds are already barred from funding abortions and that Planned Parenthood provides routine medical care to millions of American women.

https://www.washingtonpost.com/powerpost/house-leaders-brace-for-the-task-ahead-selling-obamacare-lite/2017/03/07/ab2f721e-02e5-11e7-ad5b-d22680e18d10_story.html?utm_term=.b64bbc38491c

A Disappointing Start

by THE EDITORS March 7, 2017 12:45 PM We believe that Obamacare should be repealed and replaced with policies that enable Americans to make their own decisions about what sort of health insurance to

We believe that Obamacare should be repealed and replaced with policies that enable Americans to make their own decisions about what sort of health insurance to buy, and that their options should include low-premium coverage that protects them against the risk of major financial setbacks resulting from health care. The legislation released last night by House Republicans is, even on the most charitable reading, only a first step toward that goal.

It does not repeal all of Obamacare, leaving many of its regulations in place. The apparent rationale for this omission is that eliminating the regulations would subject the legislation to a fatal Senate filibuster. We have recommended that Republicans defang the regulations by replacing Obamacare’s subsidies with a simple new tax credit that people could use to buy insurance governed by a new, lighter regulatory regime. That way Obamacare’s regulations would stay on the books but no longer hinder consumer choice. But Republicans shrank from this option, too.

We disagree with this tactical decision, which places Senate parliamentary rules — or, rather, places guesses about how those rules would operate — ahead of good health policy and making good on longstanding party promises. It also seems to us that Republicans would be better off rallying behind a bill in which they really believe, even if Democrats kill it with a filibuster, than trying and failing to enact a bill that they support only tepidly. That second outcome may now take place.

Moreover, the legislation has some serious flaws even as a first step toward full repeal and replacement. It eliminates Obamacare’s fines on people who go without insurance, but in their place creates a new surcharge for people who let their insurance lapse and then try to purchase a new policy. The goal is to keep healthy people from leaving the insurance rolls and thus destabilizing insurance markets.

The surcharge is a heavy-handed instrument: Insurers would be obligated to impose it regardless of their preferences. Yet the surcharge might not achieve its goal. A lot of healthy people might well decide to go without insurance and run the risk of paying a surcharge if they get sick later. The surcharge even undermines its own goal, since it would discourage healthy people who had already left the insurance rolls from getting back on them.

The bill has its good points. If the surcharge works, the deregulation in the bill would lower premiums. Many of Obamacare’s taxes would be repealed. Obamacare’s tax credits create high effective marginal tax rates for people in the lower middle class; the bill’s replacement tax credits would avoid this problem. Permissible contributions to and limits on health savings accounts would be loosened. Federal contributions to Medicaid would be capped, ending the perverse incentives that have for decades enabled the growth of the program. All in all, though, the bill is a disappointment. And it is not too late to get a second opinion.

All in all, though, the bill is a disappointment. And it is not too late to get a second opinion.

 http://www.nationalreview.com/article/445558/obamacare-replacement-republican-plan-house-representatives-disappointing

Story 2: Wikileaks Vault 7 Release Reveals CIA’s Collection of Hacking Tools and Malware of Secret Surveillance Spying Security State (S5) — Intelligence Community Are Listening and Watching — George Orwell Was An Optimist — Two Party Turnkey Tyranny — Videos — 

Image result for vault 7 cia

Image result for vault 7 cia

Image result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotes

Image result for george orwell quotesImage result for george orwell quotes

Image result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotes

Image result for george orwell quotes

Ari Fleischer on CIA leaks, wiretapping claims

Wikileaks Claims CIA Is Hacking Americans’ Electronics – Tucker Carlson Tonight – Fox News – 3/7/17

Wikileaks dumps information claiming proof of CIA hacking

What Pisses Me Off About Wikileaks Vault 7 Release

‘Cyber warfare is a new frontline’: CIA created malware designed to penetrate software – WikiLeaks

VAULT 7: CIA Staged Fake Russian Hacking to Set Up Trump — Russian Cyber-Attack M.O. As False Flag

Former CIA Director: Wikileaks Dump Could Be ‘Very Damaging’ | Andrea Mitchell | MSNBC

On the Russia Lunacy & Wikileaks BOMBSHELL Leak of CIA Hacking Force

Wikileaks Vault 7: A Massive and Confusing Revelation

WikiLeaks UNLEASHES ‘Year Zero’ CIA Hacking Tools (Vault 7)

WIKILEAKS VAULT 7: The C.I.A. Is Listening Via Everything

Inside Vault 7: CIA Hacking Tools Published by Wikileaks

George Orwell 1984 Telescreen Exercise

Nineteen Eighty-Four (1984) – Last Scene

ANIMAL FARM – full movie

1984 George Orwell – Full Movie – Hollywood best Greatest blockbuster movie Film

Watch Nineteen Eighty Four Watch Movies Online Free

George Orwell: A Life in Pictures Full Documentary (High Quality)

A Final Warning from George Orwell

Wikileaks Unveils ‘Vault 7’: “The Largest Ever Publication Of Confidential CIA Documents”; Another Snowden Emerges

Tyler Durden's picture

TwitterFacebookReddit

WikiLeaks has published what it claims is the largest ever release of confidential documents on the CIA. It includes more than 8,000 documents as part of ‘Vault 7’, a series of leaks on the agency, which have allegedly emerged from the CIA’s Center For Cyber Intelligence in Langley, and which can be seen on the org chart below, which Wikileaks also released:

A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”

WikiLeaks tweeted the leak, which it claims came from a network inside the CIA’s Center for Cyber Intelligence in Langley, Virginia.

Among the more notable disclosures which, if confirmed, “would rock the technology world“, the CIA had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”

Another profound revelation is that the CIA can engage in “false flag” cyberattacks which portray Russia as the assailant. Discussing the CIA’s Remote Devices Branch’s UMBRAGE group, Wikileaks’ source notes that it “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”

As Kim Dotcom summarizes this finding, “CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE

CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE

But perhaps what is most notable is the purported emergence of another Snowden-type whistleblower: the source of the information told WikiLeaks in a statement that they wish to initiate a public debate about the “security, creation, use, proliferation and democratic control of cyberweapons.”  Policy questions that should be debated in public include “whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency,” WikiLeaks claims the source said.

The FAQ section of the release, shown below, provides further details on the extent of the leak, which was “obtained recently and covers through 2016”. The time period covered in the latest leak is between the years 2013 and 2016, according to the CIA timestamps on the documents themselves. Secondly, WikiLeaks has asserted that it has not mined the entire leak and has only verified it, asking that journalists and activists do the leg work.

Among the various techniques profiled by WikiLeaks is “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As Kim Dotcom chimed in on Twitter, “CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones” and added ” CIA turned every Microsoft Windows PC in the world into spyware. Can activate backdoors on demand, including via Windows update”

BREAKING: CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones.

Dotcom also added that “Obama accused Russia of cyberattacks while his CIA turned all internet enabled consumer electronics in Russia into listening devices. Wow!”

Obama accused Russia of cyberattacks while his CIA turned all internet enabled consumer electronics in Russia into listening devices. Wow!

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Key Highlights from the Vault 7 release so far:

  • “Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.
  • Wikileaks claims that the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
  • By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook.
  • The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.
  • Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Snowden 2.0?

  • In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

CIA targets iPhones, Androids, smart TVs:

  • CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).
  • The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

Also cars, suggesting that the CIA may have a role in the death of Michael Hastings:

  • As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks.
  • The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

And computers:

  • The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Hoarding of Zero Day exploits:

  • In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.
  • Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

Proliferation of leaked/hacked Cyberwar programs:

  • While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain. Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.
  • Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.
  • Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

The U.S. Consulate in Frankfurt is a covert CIA hacker base

  • In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa. CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover.
  • The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Examples of CIA projects

  • The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools. The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.
  • Umbrage: The CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation. With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.
  • Fine Dining:  Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations.  Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals.
  • ‘Improvise’; a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor).
  • HIVE: HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants. The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

And some key sections from the FAQ:

  • What time period is covered? The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first). WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.
  • What is “Vault 7” “Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.
  • What is the total size of “Vault 7”? The series is the largest intelligence publication in history.
  • When was each part of “Vault 7” obtained?: Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.
  • Is each part of “Vault 7” from a different source? Details on the other parts will be available at the time of publication.
  • How did WikiLeaks obtain each part of “Vault 7”? Sources trust WikiLeaks to not reveal information that might help identify them.
  • Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series? No. That would be certainly counter-productive.

* * *

PREVIOUSLY

As a reminder, last night Wikileaks announced that it has released an encrypted torrent file which reportedly contains information on the mysterious “Vault 7”, and which we now know is the biggest “collection of material about CIA activities obtained by WikiLeaks.publication in history.” It can be downloaded now at the following URL, and accessed using the password “SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds”

Wikileaks had previously announced that it would hold an 8am Eastern press conference, as part of the unveiling.

ANNOUNCE: WikiLeaks press conference in under five hours at 8am ET / 1pm UTC / 14:00 CET. Streamed live.

However, there appeared to have been some complications, with Wikileaks tweeting that “the press conference is under attack: Facebook+Periscope video used by WikiLeaks’ editor Julian Assange have been attacked. Activating contingency plans”

Press conf under attack: Facebook+Periscope video used by WikiLeaks’ editor Julian Assange have been attacked. Activating contingency (1/2)

Wikileaks then announced that “As Mr. Assange’s Perscipe+Facebook video stream links are under attack his video press conference will be rescheduled.”

NOTICE: As Mr. Assange’s Perscipe+Facebook video stream links are under attack his video press conference will be rescheduled.

In a separate tweet, Wikileaks has just released the passphrase to decrypt the torrent file: RELEASE: CIA Vault 7 Year Zero decryption passphrase:

SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds

RELEASE: CIA Vault 7 Year Zero decryption passphrase:

SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds

As a result, since Assange appears to have been unable to launch his previously scheduled press conference, he has gone ahead and issued the press release on Vault 7 Part 1 “Year Zero, which is titled: Inside the CIA’s global hacking force:

Press Release

Vault 7: CIA Hacking Tools Revealed

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

* * *

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

http://www.zerohedge.com/news/2017-03-07/wikileaks-hold-press-conference-vault-7-release-8am-eastern

WikiLeaks Posts Thousands of Purported CIA Cyberhacking Documents

Records show CIA able to spy on smartphones, internet TVs

WikiLeaks released thousands of documents and files Tuesday that it said exposed hacking tools the Central Intelligence Agency uses.

WikiLeaks released thousands of documents and files Tuesday that it said exposed hacking tools the Central Intelligence Agency uses.PHOTO: LARRY DOWNING/REUTERS

WASHINGTON—WikiLeaks released thousands of documents and files Tuesday that it said exposed tools the Central Intelligence Agency uses to hack smartphones, computer operating systems, messenger applications and internet-connected televisions.

The unauthorized disclosure—the first part of which WikiLeaks said consisted of 8,761 documents and files from the CIA’s Center for Cyber Intelligence—confronts President Donald Trump with a threat from the very organization that leaked documents on his opponent, Democrat Hillary Clinton, during the 2016 presidential campaign.

WikiLeaks named the series of files “Vault 7” and called the unauthorized disclosure the “largest ever publication of confidential documents on the agency,” saying it exposed the malware and exploits the agency amassed to hack smartphones and turn some televisions into covert microphones.

A CIA spokesman declined to comment “on the authenticity or content of purported intelligence documents.”

An intelligence source said some of the information does pertain to tools that the CIA uses to hack computers and other devices. This person said disclosing the information would jeopardize ongoing intelligence-gathering operations and the revelations were far more significant than the leaks of Edward Snowden, a former contractor for the National Security Agency who exposed active surveillance programs in 2013.

Mr. Snowden’s leaks revealed names of programs, companies that assist the NSA in surveillance and in some cases the targets of American spying. But the recent leak purports to contain highly technical details about how surveillance is carried out. That would make them far more revealing and useful to an adversary, this person said.

In one sense, Mr. Snowden provided a briefing book on U.S. surveillance, but the CIA leaks could provide the blueprints.

WikiLeaks said in its statement that it was not publishing such information as computer source code that could be used to replicate the tools it claims to have exposed. But the group left open the possibility of publishing those crucial details if “a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should [sic] analyzed, disarmed and published.”

Mr. Snowden said in a tweet Tuesday, “Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic.”

WikiLeaks said the CIA recently “lost control” of the majority of its hacking arsenal. “This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA,” the site said in a statement. “The archive appears to have been circulating among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”

The website put out what it called the first installment in a series of planned leaks on Tuesday, calling it “Year Zero.” It said the first installment “introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of ‘zero day’ weaponized exploits against a wide range of U.S. and European company products.”

WikiLeaks said the information on CIA hacking came from an unidentified source who believes the spy agency’s hacking authorities “urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency.”

Much of what WikiLeaks posted Tuesday appeared to be a kind of internal Wikipedia for U.S. cyber-warfare developers to collaborate, post and access information about available hacking tools. In many instances, WikiLeaks has redacted entries that appear to link to specific executable files. The documents show, for example, what capabilities exist to bypass antivirus software, with a different entry for each antivirus company.

The revelations are sure to fuel an ongoing debate over whether intelligence agencies that discover security flaws in popular technology should disclose them, so that the users can defend themselves from hackers, or keep that information secret for use in intelligence operations.

One document claims that the CIA has discovered numerous ways to hack into versions of Apple’s iOS, the mobile operating system used on iPhones. In general, hacking tools for the iPhone are considered especially valuable because the technology is so widely used, experts said. One particular hacking tool appears to remain on an iPhone even after it has been rebooted, which would make it particularly valuable to an intruder.

“These documents, which appear to be authentic, show that the intelligence community has deliberately maintained vulnerabilities in the most common devices used by hundreds of millions of people,” Ben Wizner, the director of the Speech, Privacy, and Technology Project at the American Civil Liberties Union, said in a statement.

“Those vulnerabilities will be exploited not just by our security agencies, but by hackers and governments around the world. The government has the capacity and obligation to help technology companies fix vulnerabilities as soon as they are discovered,” Mr. Wizner said.

This is the latest high-profile leak of information by WikiLeaks, which last fall published emails stolen from Mrs. Clinton’s campaign chairman, John Podesta. U.S. intelligence agencies concluded that Russian government hackers stole those emails and provided them to WikiLeaks.

WikiLeaks said the documents show the CIA’s ability to bypass the encryption of popular messenger applications, including WhatsApp, Signal, Telegram and Confide by hacking the smartphones they run on and collecting audio and message traffic before the applications encrypt the user’s texts.

The site said the documents also show how the CIA developed other mobile hacking technologies, including the ability to activate the camera and microphone of a target’s smartphone covertly and surreptitiously retrieve a target’s geolocation, audio and text communications.

WikiLeaks said one of the documents also shows how the CIA developed a program to hack internet-connected televisions in conjunction with British intelligence. The attacks can place Samsung smart TVs in a fake off mode, so the owner believes the television is switched off, while in reality it is functioning as a bug and recording conversations in the room, WikiLeaks said.

https://www.wsj.com/articles/wikileaks-posts-thousands-of-purported-cia-cyberhacking-documents-1488905823

WikiLeaks publishes massive trove of CIA spying files in ‘Vault 7’ release

Julian Assange claims that documents are the most comprehensive CIA release ever and are far larger than the Snowden files

The Independent Tech

WikiLeaks has published a huge trove of what appear to be CIA spying secrets.

The files are the most comprehensive release of US spying files ever made public, according to Julian Assange. In all, there are 8,761 documents that account for “the entire hacking capacity of the CIA”, Mr Assange claimed in a release, and the trove is just the first of a series of “Vault 7” leaks.

Already, the files include far more pages than the Snowden files that exposed the vast hacking power of the NSA and other agencies.

 In publishing the documents, WikiLeaks had ensured that the CIA had “lost control of its arsenal”, he claimed. That included a range of software and exploits that if real could allow unparalleled control of computers around the world.

It includes software that could allow people to take control of the most popular consumer electronics products used today, claimed WikiLeaks.

“‘Year Zero’ introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones,” the organisation said in a release.

The public files don’t include the cyber weapons themselves, according to a statement. The organisation will refrain from distributing “armed” software “until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published”, it said.

The files were made available by a source who intended for them to start a conversation about whether the CIA had gained too much power, according to the organisation.

“In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency,” a release read. “The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.”

It also redacts the details of some of the names, locations and targets that are identified in the documents.

The organisation had teased the release in advance with strange messages about the release being “Year Zero”, and references to “Vault 7”. It had planned to release the files later on but that plan was thrown off when its press conference came under cyber attack, Mr Assange claimed.

http://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-cia-vault-7-julian-assange-year-zero-documents-download-spying-secrets-a7616031.html

WikiLeaks releases ‘entire hacking capacity of the CIA’

Gutfeld: ‘Day Without a Woman’ strike sends wrong message

WikiLeaks on Tuesday released what it said is the full hacking capacity of the CIA in a stunning 8,000-plus page disclosure the anti-secrecy website contends is “the largest ever publication of confidential documents on the agency.”

The 8,761 documents and files — released as “Vault 7 Part 1” and titled “Year Zero” — were obtained from an “isolated, high-security network” at the CIA’s Center for Cyber Intelligence in Langley, Va., a press release from the website said. The trove had been “circulated among former U.S. government hackers and contractors,” one of whom “recently” gave the archive to WikiLeaks. The CIA allegedly employs more than 5,000 people in its cyber spying operation and had produced more than 1,000 programs as of 2016.

“We do not comment on the authenticity or content of purported intelligence documents,” a CIA spokesperson told Fox News.

The collection of purported intelligence documents includes information on CIA-developed malware — bearing names such as “Assassin” and “Medusa” — intended to target iPhones, Android phones, smart TVs and Microsoft, Mac and Linux operating systems, among others. An entire unit in the CIA is devoted to inventing programs to hack data from Apple products, according to WikiLeaks.

WIKILEAKS OFFERS REWARD FOR INFO ON OBAMA MISDEEDS

Some of the remote hacking programs can allegedly turn numerous electronic devices into recording and transmitting stations to spy on their targets, with the information then sent back to secret CIA servers. One document appears to show the CIA was trying to “infect” vehicle control systems in cars and trucks for unspecified means.

WikiLeaks hinted that the capabilites revealed in Tuesday’s disclosure could have even darker utility than simply spying.

“It would permit the CIA to engage in nearly undetectable assassinations,” the release stated.

WikiLeaks confirms CIA can effectively bypass Signal + Telegram + WhatsApp + Confide encryptionhttps://wikileaks.org/ciav7p1 

FLASHBACK: WIKILEAKS REVEALS CLINTON ‘HITS’ FILE ON SANDERS

The site said the CIA additionally failed to disclose security vulnerabilities and bugs to major U.S. software manufacturers, violating an Obama administration commitment made in January 2014. Instead, the agency used the software vulnerabilities — which could also be exploited by rival agencies, nations and groups — for its own ends, WikiLeaks said.

CIA hackers celebrated what they saw as the financial largesse of Obama towards them with “Make It Rain” gifhttps://wikileaks.org/ciav7p1/cms/files/makeitrain.gif 

“As an example, specific CIA malware revealed in ‘Year Zero’ is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts,” the WikiLeaks release stated.

Digital rights non-profit Access Now said in a statement on Tuesday it was “fantasy to believe only the ‘good guys'” would be able to use the discovered vulnerabilities.

“Today, our digital security has been compromised because the CIA has been stockpiling vulnerabilities rather than working with companies to patch them,” Senior Legislative Manager Nathan White said.

The CIA allegedly also maintains a database of malware created in other nations — WikiLeaks specifically cites Russia — in order to disguise its own hacking attempts as the work of another group.

In what is described by WikiLeaks as “one of the most astounding intelligence own goals in living memory,” the CIA is said to have made most of its programs unclassified to avoid legal consequences for transmitting classified information through the Internet — a move that increased the risk of outside groups pirating the cyber spying tools.

WikiLeaks also revealed the U.S. Consulate in Frankfurt is a hacking base, and the website provided the methods by which agents obfuscate customs officers to gain entry to Germany, pretending to provide technical consultation.

WikiLeaks said its source released the files because they believed questions surrounding the CIA’s reach “urgently need to be debated in public,” echoing the motives of many previous leakers.

PSA: This incorrectly implies CIA hacked these apps / encryption. But the docs show iOS/Android are what got hacked – a much bigger problem. https://twitter.com/wikileaks/status/839120909625606152 

Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic.

One such former leaker, Edward Snowden, tweeted Tuesday afternoon about the WikiLeaks release.

“Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic,” wrote Snowden, who has been granted asylum in Russia as he seeks to avoid criminal prosecution in the U.S.

Some of the WikiLeaks files include redacted information, such as tens “of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States.”

http://www.foxnews.com/us/2017/03/07/wikileaks-releases-entire-hacking-capacity-cia.html

Vault 7: CIA Hacking Tools Revealed

  • Releases
  • Documents

Press Release

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includesnumerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of “Vault 7” — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‘battlefield’ of cyber ‘war’.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted “malware injections” (commercial jargon) or “implant drops” (NSA jargon) are being called “fires” as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful ‘attack’ on a target’s computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization’s leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target’s territory including observation, infiltration, occupation and exploitation.

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.

CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.

Examples

The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks’ “Year Zero”.

UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals. The ‘Case Officer’ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‘menu’ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‘JQJIMPROVISE’ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

Improvise (JQJIMPROVISE)

‘Improvise’ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‘Fine Dining’ questionairies.

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE.

Frequently Asked Questions

Why now?

WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a “Cyberwar” review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

Redactions

Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

  1. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
  2. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
  3. Archive attachments (zip, tar.gz, …) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
  4. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
  5. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
  6. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

Wiki pages

“Year Zero” contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.

The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

Is each part of “Vault 7” from a different source?

Details on the other parts will be available at the time of publication.

What is the total size of “Vault 7”?

The series is the largest intelligence publication in history.

How did WikiLeaks obtain each part of “Vault 7”?

Sources trust WikiLeaks to not reveal information that might help identify them.

Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

Has WikiLeaks already ‘mined’ all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

Won’t other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.

https://wikileaks.org/ciav7p1/

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 850-853

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 759, September 20, 2016, Story 1: Obama’s Globalist Swan Song To United Nations — Course Correction — Time To Take The United Nations Out of The United States and Relocate It to Democratic Republic of Congo and United States Out of United Nations — Videos — Story 2: Trump Calls For Tighter Screening of Immigrants and Extreme Vetting and Police Profiling in Wake of Bombings — Videos

Posted on September 20, 2016. Filed under: 2016 Presidential Campaign, 2016 Presidential Candidates, American History, Benghazi, Blogroll, Breaking News, Congress, Constitutional Law, Corruption, Countries, Crime, Cruise Missiles, Culture, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Drones, Education, Elections, Empires, Employment, Fast and Furious, Genocide, Government Dependency, Government Spending, Hillary Clinton, Hillary Clinton, History, House of Representatives, Illegal Immigration, Illegal Immigration, Immigration, Iran Nuclear Weapons Deal, Islam, Islamic Republic of Iran, Law, Legal Immigration, Medicare, MIssiles, News, Nuclear, Obama, Philosophy, Photos, Politics, Polls, President Barack Obama, Progressives, Radio, Raymond Thomas Pronk, Regulation, Religion, Scandals, Second Amendment, Security, Senate, Socials Security, Taxation, Taxes, Terror, Terrorism, Unemployment, United States Constitution, United States of America, Videos, Violence, War, Wealth, Weapons, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 759: September 20, 2016

Pronk Pops Show 758: September 19, 2016 

Pronk Pops Show 757: September 16, 2016 

Pronk Pops Show 756: September 15, 2016

Pronk Pops Show 755: September 14, 2016 

Pronk Pops Show 754: September 13, 2016 

Pronk Pops Show 753: September 12, 2016 

Pronk Pops Show 752: September 9, 2016 

Pronk Pops Show 751: September 8, 2016 

Pronk Pops Show 750: September 7, 2016 

Pronk Pops Show 749: September 2, 2016 

Pronk Pops Show 748: September 1, 2016

Pronk Pops Show 747: August 31, 2016 

Pronk Pops Show 746: August 30, 2016 

Pronk Pops Show 745: August 29, 2016 

Pronk Pops Show 744: August 26, 2016 

Pronk Pops Show 743: August 25, 2016

Pronk Pops Show 742: August 24, 2016 

Pronk Pops Show 741: August 23, 2016 

Pronk Pops Show 740: August 22, 2016

Pronk Pops Show 739: August 18, 2016

Pronk Pops Show 738: August 17, 2016

Pronk Pops Show 737: August 16, 2016

Pronk Pops Show 736: August 15, 2016

Pronk Pops Show 735: August 12, 2016

Pronk Pops Show 734: August 11, 2016

Pronk Pops Show 733: August 9, 2016

Pronk Pops Show 732: August 8, 2016

Pronk Pops Show 731: August 4, 2016

Pronk Pops Show 730: August 3, 2016

Pronk Pops Show 729: August 1, 2016

Pronk Pops Show 728: July 29, 2016

Pronk Pops Show 727: July 28, 2016

Pronk Pops Show 726: July 27, 2016

Pronk Pops Show 725: July 26, 2016

Pronk Pops Show 724: July 25, 2016

Pronk Pops Show 723: July 22, 2016

Pronk Pops Show 722: July 21, 2016

Pronk Pops Show 721: July 20, 2016

Pronk Pops Show 720: July 19, 2016

Pronk Pops Show 719: July 18, 2016

Pronk Pops Show 718: July 15, 2016

Pronk Pops Show 717: July 14, 2016

Pronk Pops Show 716: July 13, 2016

Pronk Pops Show 715: July 12, 2016

Pronk Pops Show 714: July 7, 2016

Pronk Pops Show 713: July 6, 2016

Pronk Pops Show 712: July 5, 2016

Pronk Pops Show 711: July 1, 2016

Pronk Pops Show 710: June 30, 2016

Pronk Pops Show 709: June 29, 2016

Pronk Pops Show 708: June 28, 2016

Pronk Pops Show 707: June 27, 2016

Pronk Pops Show 706: June 24, 2016

Pronk Pops Show 705: June 23, 2016

Pronk Pops Show 704: June 22, 2016

Pronk Pops Show 703: June 21, 2016

Pronk Pops Show 702: June 20, 2016

Pronk Pops Show 701: June 17, 2016

Pronk Pops Show 700: June 16, 2016

Pronk Pops Show 699: June 15, 2016

Pronk Pops Show 698: June 14, 2016

Pronk Pops Show 697: June 13, 2016

Pronk Pops Show 696: June 10, 2016

Pronk Pops Show 695: June 9, 2016

Pronk Pops Show 694: June 8, 2016

Pronk Pops Show 693: June 6, 2016

Pronk Pops Show 692: June 3, 2016

Pronk Pops Show 691: June 2, 2016

Pronk Pops Show 690: June 1, 2016

Story 1: Obama’s Globalist Swan Song To United Nations — Calls For Course Correction — Time To Take The United Nations Out of The United States and Relocate It to Democratic Republic of Congo and United States Out of United Nations  — Videos —

Image result for refuge meeting for President Obama at United Nations september 20, 2016Image result for President Obama at United Nations september 20, 2016Image result for President Obama at United Nations september 20, 2016Image result for President Obama at United Nations september 20, 2016

Image result for MAP REPUBLIC OF CONGO

Image result for MAP RESOURCES OF REPUBLIC OF CONGO

President Obama Speech at United Nations General Assembly. Sep 20, 2016.

#Fox News (9/20/16) Pres Obama Takes Veiled Jab At Trump At U.N. – America’s Election HQ

Obama Brags About His Globalist Legacy At Final UN Speech

Mike Pence responds to President’s criticism of Trump

Report: More than 850 immigrants mistakenly given U.S. citizenship

Bolton: No question Iran negotiators took Kerry to lunch

Obama Pushes GLOBALIZATION Agenda at Last UN Speech

Obama, In Final UN Speech, Calls For World Course Correction

Obama, in final UN speech, urges more help for refugees

Obama warns against ‘walls’ in final speech to U.N.

The Quint: No Military Victory Possible in Syria: Barack Obama at UNGA

Obama to African dictators Paul Kagame, Joseph Kabila, Denis Sassou Nguesso etc.

DR CONGO – Violence rocks Kinshasa amid fears of Kabila power grab

Can Joseph Kabila leave an Unprecedented Legacy?

Congo and Africa’s World War: Crash Course World History 221

King Leopold’s Ghost

Mind blowing speech by Robert Welch in 1958 predicting Insiders plans to destroy America

‘2030 Agenda’: Latest UN Plan for World Government

Changing Our Society to Merge U.S Into New World Order

John Birch Society on the Illuminati and the New World Order

citizenM “Swan Song” by PES

Clashes in Kinshasa leave 50 dead, say DRC opposition groups

Unrest over president Joseph Kabila’s decision to delay elections continues, with opposition party HQs torched overnight

Demonstrators gather in front of a burning car during an opposition rally in Kinshasa.
Demonstrators gather in front of a burning car during an opposition rally in Kinshasa. Photograph: Eduardo Soteras/AFP/Getty Images

Police and demonstrators have clashed in the Democratic Republic of the Congo, in the latest round of violence sparked by the ongoing political crisis in the troubled central African state.

Opposition groups said more than 50 people died on Monday in clashes in the capital, Kinshasa. The government said at least 17 people had been killed but warned that the toll could rise further.

Witnesses said protesters had beaten at least one police officer to death.

Four people were also killed when the headquarters of three DRC opposition parties were torched overnight and early on Tuesday, Agence France-Presse reported.

Fuchsia-coloured flares are launched by DRC police forces during a demonstration in Goma.
Pinterest
Fuchsia-coloured flares are launched by DRC police forces during a demonstration in Goma. Photograph: Mustafa Mulopwe/AFP/Getty Images

The DRC has suffered repeated bouts of unrest since the president, Joseph Kabila, announced that elections scheduled for later this year would be delayed.

Opponents say Kabila, whose second term in power expires in December, is trying to cling to power undemocratically. His supporters say logistical and financial constraints mean it is impossible to hold fair polls as planned.

A witness from the Reuters news agency said police had fired into the crowd in Kinshasa.

Bruno Tshibala, a spokesman for an opposition party, said activists had recorded several deaths and that he had seen four bodies piled up in the office of an allied faction.

Kabila took over as leader of the DRC less than two weeks after his father, Laurent, was shot by a bodyguard in the presidential palace in 2001. He was elected president in disputed polls in 2006 and again in 2011. The DRC’s constitution bars a third term.

Western states, including the US, have told Kabila to stick to the election calendar.

Congolese policemen detain opposition activists in Kinshasa.
Pinterest
Congolese police officers detain opposition activists in Kinshasa. Photograph: Kenny Katombe/Reuters

Kabila’s backers and some opposition members announced an agreement on the timing of elections last week. Alexis Thambwe Mwamba, the justice minister, said an interim government including members of the opposition would be formed and the election postponed until mid-2017.

“The government will be redone. We will put in place a government that we will co-manage between the presidential majority, the opposition and civil society,” Mwamba said.

Most major opposition parties have boycotted the discussions and it appears unlikely the announced agreement will end the unrest. One point of contention is the timing of different sets of elections. Another is the revision of the electoral roll.

President Joseph Kabila.
Pinterest
President Joseph Kabila. Photograph: Lionel Healing/AFP/Getty

Kabila loyalists say problems with the electoral roll make it impossible to hold a fair poll this year. The current version is thought to exclude about half of the DRC’s 45 million potential voters, including about 7 million new voters who have come of age since 2011. Independent experts have said a complete revision could take 10-18 months.

Increasing US concern has prompted a diplomatic offensive by senior officials close to Kabila in recent weeks. Barnabe Kikaya Bin Karubi, who is Kabila’s chief diplomatic adviser, is in Washington on a “pleading mission” to Washington to press US officials not to impose sanctions against key political figures.

“There are two resolutions that were pending in the House to impose sanctions on Congolese officials,” Kikaya said last week. “My mission is to plead with American officials and to prove to them that sanctions are not a solution to help us resolve our problems.”

Kikaya denied that Kabila was seeking to stay in power and rejected accusations that the delay in the election was “purposefully engineered”.

The constitution “means a lot to him and he will not violate it”, Kikaya said.

Analysts say that whereas neighbouring strongmen Denis Sassou Nguesso in Congo-Brazzaville and Paul Kagame in Rwanda have easily pushed through constitutional changes to allow them to stand for third terms, Kabila has been unable to take such a blunt approach.

Kabila did manage to outmanoeuvre Moise Katumbi, a tycoon who was seen as a powerful challenger. Katumbi, who had built a support base in Katanga province, was forced to leave the country earlier this year to seek medical treatment. He too is lobbying foreign powers.

Observers differ over the potential for widespread conflict. The DRC’s sprawling borders reach nine other African countries, and it has been argued that an implosion in the vast country could spark instability in its neighbours.

Others say regional powers have little interest in sparking a violent battle to exploit the country’s resources.

Civil wars fuelled by foreign interference killed millions of people in DRC between 1996 and 2003.

The country is nearly two-thirds the size of western Europe and has a population of more than 79 million. Since it won independence from Belgium in 1960, there has never been a peaceful, democratic transition of power.

https://www.theguardian.com/world/2016/sep/19/democratic-republic-congo-demonstrations-banned-police-killed-joseph-kabila-etienne-tshisekedi

 

Story 2: Trump Calls For Tighter Screening of Immigrants and Extreme Vetting and Police Profiling in Wake of Bombings — Videos

Full Event: Donald Trump Rally in High Point, NC (9/20/2016) Trump High Point University Speech

CNN falsely adds ‘racial’ to Trump’s comments on profiling

Trump calls for tighter screening of immigrants

Donald Trump vows ‘extreme vetting’ of immigrants

Donald Trump Calls for Police Profiling in Wake of Bombings

John Birch Society: Donald Trump Scares the Establishment

General Jack Keane: ’Closing The Border Has Always Made Sense From A Nat’l Security Perspective.’

Hillary Clinton: Trump rhetoric helps terrorists

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 759

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or Download Shows 713-719

Listen To Pronk Pops Podcast or Download Shows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 736, August 15, 2016, Story 1: The Inescapable Consequences of Obama The Great Divider — Black Milwaukee Mob Race Riots and Violence — Law of The Jungle vs. Law and Order — Sheriff David Clarke Blames Milwaukee Riots On Progressive Liberal Democrats Pushing Government Dependency on Welfare State — Case of Big Government or State Failures — Getting Out The Black Vote — Story 2: Hillary Clinton Wants More of The Same Spending on Government Programs, More of The Status Quo — No Hope, No Change, More Government Dependency On The Road To Serfdom — Videos

Posted on August 15, 2016. Filed under: 2016 Presidential Campaign, 2016 Presidential Candidates, Addiction, American History, Assault, Blogroll, Breaking News, Bribery, Budgetary Policy, City, College, Communications, Congress, Corruption, Countries, Crime, Culture, Desertion, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Drugs, Economics, Education, Elections, Employment, Eugenics, Federal Government, Fiscal Policy, Government, Government Dependency, Government Spending, Health, Hillary Clinton, History, Homicide, House of Representatives, Housing, Human, Human Behavior, Illegal Drugs, Illegal Drugs, Investments, Labor Economics, Law, Legal Drugs, Life, Lying, Media, Monetary Policy, Networking, News, Obama, Philosophy, Photos, Politics, Polls, Pro Abortion, Progressives, Radio, Raymond Thomas Pronk, Scandals, Security, Senate, Social Networking, Social Science, Social Security, Socials Security, Tax Policy, Taxation, Taxes, Terror, Terrorism, Trade Policy, United States Constitution, United States of America, Videos, Violence, Wealth, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , , , , , , , |

 

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 736: August 15, 2016

Pronk Pops Show 735: August 12, 2016

Pronk Pops Show 734: August 11, 2016

Pronk Pops Show 733: August 9, 2016

Pronk Pops Show 732: August 8, 2016

Pronk Pops Show 731: August 4, 2016

Pronk Pops Show 730: August 3, 2016

Pronk Pops Show 729: August 1, 2016

Pronk Pops Show 728: July 29, 2016

Pronk Pops Show 727: July 28, 2016

Pronk Pops Show 726: July 27, 2016

Pronk Pops Show 725: July 26, 2016

Pronk Pops Show 724: July 25, 2016

Pronk Pops Show 723: July 22, 2016

Pronk Pops Show 722: July 21, 2016

Pronk Pops Show 721: July 20, 2016

Pronk Pops Show 720: July 19, 2016

Pronk Pops Show 719: July 18, 2016

Pronk Pops Show 718: July 15, 2016

Pronk Pops Show 717: July 14, 2016

Pronk Pops Show 716: July 13, 2016

Pronk Pops Show 715: July 12, 2016

Pronk Pops Show 714: July 7, 2016

Pronk Pops Show 713: July 6, 2016

Pronk Pops Show 712: July 5, 2016

Pronk Pops Show 711: July 1, 2016

Pronk Pops Show 710: June 30, 2016

Pronk Pops Show 709: June 29, 2016

Pronk Pops Show 708: June 28, 2016

Pronk Pops Show 707: June 27, 2016

Pronk Pops Show 706: June 24, 2016

Pronk Pops Show 705: June 23, 2016

Pronk Pops Show 704: June 22, 2016

Pronk Pops Show 703: June 21, 2016

Pronk Pops Show 702: June 20, 2016

Pronk Pops Show 701: June 17, 2016

Pronk Pops Show 700: June 16, 2016

Pronk Pops Show 699: June 15, 2016

Pronk Pops Show 698: June 14, 2016

Pronk Pops Show 697: June 13, 2016

Pronk Pops Show 696: June 10, 2016

Pronk Pops Show 695: June 9, 2016

Pronk Pops Show 694: June 8, 2016

Pronk Pops Show 693: June 6, 2016

Pronk Pops Show 692: June 3, 2016

Pronk Pops Show 691: June 2, 2016

Pronk Pops Show 690: June 1, 2016

Pronk Pops Show 689: May 31, 2016

Pronk Pops Show 688: May 27, 2016

Pronk Pops Show 687: May 26, 2016

Pronk Pops Show 686: May 25, 2016

Pronk Pops Show 685: May 24, 2016

Pronk Pops Show 684: May 23, 2016

Pronk Pops Show 683: May 20, 2016

Pronk Pops Show 682: May 19, 2016

Pronk Pops Show 681: May 17, 2016

Pronk Pops Show 680: May 16, 2016

Pronk Pops Show 679: May 13, 2016

Pronk Pops Show 678: May 12, 2016

Pronk Pops Show 677: May 11, 2016

Pronk Pops Show 676: May 10, 2016

Pronk Pops Show 675: May 9, 2016

Pronk Pops Show 674: May 6, 2016

Pronk Pops Show 673: May 5, 2016

Pronk Pops Show 672: May 4, 2016

Pronk Pops Show 671: May 3, 2016

Pronk Pops Show 670: May 2, 2016

Story 1: The Inescapable Consequences of Obama The Great Divider — Black Milwaukee Mob  Race Riots  and Violence — Law of The Jungle vs. Law and Order — Sheriff David Clarke Blames Milwaukee Riots On Progressive Liberal Democrats Pushing Government Dependency on Welfare State — Case of Big Government or State Failures — Getting Out The Black Vote —

How The Milwaukee Riot Started…Video Footage Of How It All Began

MILWAUKEE COUNTY SHERIFF DAVID CLARKE FULL INTERVIEW WITH GRETA VAN SUSTEREN FOX NEWS (8/15/2016)

Dr. Keith Ablow: Obama’s Anti-Police Rhetoric To Blame For Violent Protests In Milwaukee

Five favorite moments from the black race riot in Milwaukee

Black Lives Matter Riot In Milwaukee After Police Shooting Armed Robber

Riots Erupt In Milwaukee

Milwaukee, Wisconsin Police Shooting and Riots | True News

Milwaukee Police Brutality Riot Aftermath 08-13 & 08-14 2016 Fire Shooting Gunshots Footage

Milwaukee Riots after Police Shooting RIOT in Milwaukee Wisconsin, Gunfire, Police Cars Destroyed

Sheriff David Clarke Blames Milwaukee Riots On Liberals And “Questionable Lifestyle Choices”

Milwaukee County Sheriff David A.Clarke holds very Powerful Press Conference 8/14/2016 HD

Sheriff David Clarke Gives Epic Press Conference Following Milwaukee Mayhem

Sheriff David Clarke educates congressman on Black Lives Matter

Don Lemon, sheriff spar over police shootings

Sheriff David Clarke Wrecks Don Lemon on CNN About Black Lives Matter Rhetoric Endangering Police

Sheriff Clarke on “Black Lives Matter”: “It’s a vile vulgar slimy movement”

Milwaukee Police Chief Addresses BlackLives Matter Concerns

Former Black Panther Says Black Lives Matter And Obama Is Bullshit

Black Lives Matter: Truth and Consequences | Charles C. Johnson and Stefan Molyneux

Black Lives Matter Boss Is An Old White Nazi Worth Billions

Bill O’Reilly – George Soros – Black Lives Matter

What They Won’t Tell You About Baltimore Riots

Black Lives Matter #BaltimoreRiots | True News

DEBUNKED: #BlackLivesMatter Propaganda Exposed Case-By-Case

The Worst of Black Lives Matter

The Worst of Black Lives Matter Part 2

What You Won’t Hear About Black Lives Matter

Black Genocide – Maafa 21 – Full Length

Reporter Forced Off Milwaukee Streets: Protesters Too Hostile to Whites

SIGN UP FOR OUR NEWSLETTER

An independent journalist has quit reporting from Milwaukee, saying that the situation is too dangerous for anyone who looks like a white person to be walking the streets.

“For those that are perceivably white, it is just not safe to be here … that’s why I’m deciding to leave,” reporter Tim Pool said in a video. He posted the video to his Youtube page to inform fans that he was pulling out of Milwaukee because the rioters have targeted white people for attacks.

Pool, an award winning reporter who gained notice by his coverage of the Occupy Wall Street protests in Chicago back in 2011, said even though he is not strictly white, he said he felt in danger as the protests morphed from a complaint over a police shooting to an excuse to attack white people simply for being white.

Wearing his signature pullover ski cap, the reporter told his viewers that he became too frightened for his personal safety after seeing an 18-year-old white kid being “shot in the neck” as rioters screamed for whites to be targeted.

Pool insisted he understood the anger of the crowd. “These locals are angry and they’re angry for a reason,” he said. “But things started to get really tense later in the night when people started screaming ‘f**k white people,’ ‘white people suck,’” Pool said before describing several incidents where rioters were angrily egging on their fellows to attack both white people and reporters.

The young reporter went on to stress that it “isn’t every protester” actively calling for such violence but he is still leaving the city.  “For those that are perceivably white, it is just not safe to be here. And that’s why I’m deciding to leave,” he said.

“For those that are wondering, I’m actually Korean,” Pool added, “I’m mixed [race], but, you know, most people down here, you know, when I was covering this didn’t, they don’t make that conclusion, they just looked at me and they start saying things about white people … but when you hear a group directing their anger and hate towards white people, and seeing several white people be attacked, and then finally an 18-year-old white kid is shot in the neck, that’s when I’m like, ‘OK, I shouldn’t be here,’ right?”

http://www.breitbart.com/big-government/2016/08/15/milwaukee-reporter-vows-leave-much-anti-white-sentiment-among-protesters/

BURN DOWN WHITE SUBURBS, SISTER OF MAN KILLED BY MILWAUKEE POLICE URGES RIOTERS

“Take that sh*t to the suburbs. Burn that sh*t down! We need our sh*t! We need our weave!”

“Burning down sh*t ain’t gonna help nothin’,” yells Sherelle Smith.

“You’re burnin’ down sh*t we need in our community.”

“Take that sh*t to the suburbs. Burn that sh*t down!” she demands.

“We need our sh*t! We need our weave! I don’t wear it, but we need it!”

According to police, body camera footage shows 23-year-old Sylville K. Smith aim a gun at officers before he was shot dead by an African-American cop.

The incident sparked a wave of violent unrest that continued through Sunday night.

Milwaukee is the most segregated metropolitan area in the United States, with whites almost exclusively living in the suburbs.

Between 1950 and 1990 there was a “white flight” from Milwaukee County into Waukesha County and suburbs of Milwaukee.

Smith’s call for rioters to stop burning down their own communities is being reported by the media as a rebuke to those behind the violence.

However, in reality she is really just calling for the mayhem to be inflicted on the suburbs, or in other words – where all the white people live.

Milwaukee Alderman Khalif Rainey responded to the weekend’s violence by tacitly threatening more riots if “oppression,” “unemployment” and “injustice” wasn’t addressed. Rainey failed to explain what this had to do with an armed man with a lengthy criminal record aiming a gun at police officers.

As we reported yesterday, the white people brave enough to venture through Milwaukee on Saturday night were directly targeted for racial attacks, with rioters yelling, “they white, get their ass!,” as they attempting to drag white drivers out of their vehicles.

Don’t expect a DOJ investigation or a national media “hate crime” outcry any time soon.

 

New Unrest in Milwaukee After Police Shooting Sparks Violence

by and

Play
Violent Night in Milwaukee After Fatal Police Shooting of Armed Man 1:54

At least one person was wounded after shots were fired and protesters threw objects at police in Milwaukee late Sunday night, a day after violence erupted overnight in the wake of the fatal shooting of a man by police, authorities said.

Police said they were deploying armored vehicles to protect officers and to rescue a shooting victim, who was rushed to a hospital. At midnight Monday, police declared the protest an unlawful assembly and announced that they would begin making arrests.

The National Guard was activated Sunday, but Mayor Tom Barrett said they wouldn’t be deployed unless police deemed that they were needed. “I’m hopeful that that will not be necessary,” Barrett said. “But if it is necessary, we will do so.”

Barrett urged parents to keep their children home Sunday night.

“This is still a volatile situation. I don’t know what’s going to happen tonight,” he said, adding that a curfew would be enforced if needed. At least 150 specially trained officers will be patrolling in pairs Sunday night, police said.

Image: Violence Erupts In Milwaukee After Police Officer Shoots Armed Suspect During Foot Chase
Cars stand burned in the lot of a BP gas station Sunday after rioters clashed with Milwaukee police. Darren Hauck / Getty Images

The state is investigating the shooting, which killed Sylville K. Smith, 23, after he fled a police traffic stop on foot. Milwaukee Police Chief Edward said body camera video that hasn’t been released shows that there was a “credible threat” to the officer, who has been identified only as a 24-year-old African-American man.

At some point during the brief chase, Smith turned toward the officer with the gun in his hand, Flynn said, citing the video. Smith had a “lengthy arrest record” and 23 rounds in his gun, authorities said.

The officer has been placed on administrative duty pending an investigation. He has also left town in light of threats against him and other police officers, Flynn said.

Volunteers spent Sunday morning sweeping and picking up debris from the chaos of the night before — including bricks, bottle and bullet casings — after about 100 protesters clashed with a couple of dozen officers in a predominantly black north Milwaukee neighborhood.

Image: Violence Erupts In Milwaukee After Police Officer Shoots Armed Suspect During Foot Chase
Three men help clean Sunday after rioters clashed with Milwaukee police Department. Darren Hauck / Getty Images

“I commend the citizens who volunteered in clean-up efforts this morning,” Wisconsin Gov. Scott Walker said. This act of selfless caring sets a powerful example for Milwaukee’s youth and the entire community. I join Milwaukee’s leaders and citizens in calling for continued peace and prayer.”

Four businesses were destroyed or burned badly, seven squad cars were damaged, and four officers were injured in the chaos Saturday night. Seventeen people were arrested, and 48 shots or series of shots were fired, according to police. A teenage girl was injured by a stray bullet, police said.

Officials said no shots were fired by police, and there have been no reports of use of force by officers.

“Last night was unlike anything I have seen in my adult life in this city,” Barrett said. “I’m very proud of the way our police officers and firefighters responded.”

The protesters were largely black, and Alderman Khalif Rainey — who represents the district — said early Sunday that the city’s black residents are “tired of living under this oppression.”

“This entire community has sat back and witnessed how Milwaukee, Wisconsin, has become the worst place to live for African-Americans in the entire country,” Rainey said at the end of a news conference at which Barrett pleaded for calm. “Now this is a warning cry. Where do we go from here? Where do we go as a community from here?

Related: Slew of Controversial Police Encounters Precedes Latest Shooting in Milwaukee

Milwaukee was beset by protests and calls for police reform after an officer fatally shot Dontre Hamilton, a mentally ill black man, in 2014. In December, the U.S. Justice Department announced that it would work with Milwaukee police on reforms.

Flynn had asked for what’s known as a collaborative reform process after the federal government said it wouldn’t pursue criminal civil rights charges against the officer.

http://www.nbcnews.com/news/us-news/suspect-detained-murders-new-york-city-imam-assistant-sources-n630711

 

Black Lives Matter Is Pushing Our Cities Back to the Brink

by DAVID FRENCH August 15, 2016 2:46 PM

To listen to some of the protesters, the Milwaukee shooting was the excuse for the riot, not the reason.

What happens when a city combines body cameras, a “model” law requiring independent investigations of police shootings, and a police chief so committed to reforming the way cops interact with the black community that he’s profiled on public radio’s immensely popular program This American Life? What happens in that same city when a black cop shoots an armed black suspect toting a stolen gun — a gun the suspect reportedly refused to put on the ground despite repeated commands? Do the legal reforms increase community trust? Or does the city erupt in riots and violence?

If you chose “riots and violence,” you’re correct.That’s exactly what happened in Milwaukee this weekend in response to the police shooting of Sylville Smith. Police pulled Smith over on Saturday afternoon, he fled from the scene, and police gave chase. Smith was carrying a stolen handgun. An officer with six years’ experience caught Smith, reportedly ordered him to drop the gun, and opened fire when Smith failed to comply, shooting him the in the chest and arm. Smith died.

According to police, the shooting was caught on camera. (The footage has not yet been released.) But rather than wait for the evidence or for any semblance of an investigation, hundreds of Milwaukee residents rioted, burning police cars, looting stores, and attacking police. Indeed, to listen to some of the protesters and political leaders, the shooting was merely the excuse for the riot, not the justification. Here’s one protester telling reporters that riots are happening because “rich people, they got all this money, and they not . . . trying to give us none.”

And city alderman Khalif Rainey said that the riots were “byproducts” of “the injustice, the unemployment, the under-education” that he says makes Milwaukee the “worst place to live for African-Americans in the entire country.” He ended with an ominous warning: “Rectify this immediately because, if you don’t, this vision of downtown, all of that, you one day away. You one day away.”

Then, of course, Black Lives Matter leader Deray McKesson added his own helpful thoughts — without any meaningful evidence that the police shooting was unlawful: If radical activists have their way, American cities will be ungovernable. Any police shooting will excuse a riot, even without lies like “hands up, don’t shoot.” In such an environment, police reforms are less about improving police–community relations or about making poor communities safe than they are about the raw exercise of power.

Indeed, the results speak for themselves. Despite its reforms, Milwaukee has been wracked by levels of homicide not seen since the bad days of the early 1990s. Last year, the number of fatal shootings, disproportionately black-on-black violence, hit a 22-year high: (Milwaukee Journal-Sentinel) This year is set to be terrible as well, with 83 homicides already. More than three-quarters of the victims are black, and they are not being killed by cops.

So, yes, Alderman Rainey, Milwaukee may be a terrible place for African Americans, but it is not because of the police. Here is the sobering reality of modern urban life. If police use the kinds of aggressive policing techniques that have been part of the decades-old solution to the soaring crime rates of the 1980s and early 1990s, they increase interactions with the community and inevitably increase the potential for abuse.

If, however, the police back off appreciably, decreasing the number of arrests and stops, then, as we’ve seen in city after city, homicide rates soar. But being an activist means never saying you’re sorry, so in either case oppression and death are the cops’ fault. Police aggressively, and the police are to blame for strained community relations. Back off, and the police are to blame for the chaos and violence that ensues.

The destructiveness of Black Lives Matter lies in its fundamental inability to recognize that the primary responsibility for peace and justice within black communities belongs to the community itself. The police are not making black people kill each other at alarming rates. The police are not making black people drop out of school or black men father children out of wedlock. Yet it’s remarkable the extent to which anti-police activists simply take those factors as givens and then demand that police know exactly how to navigate and defuse the resulting, inevitable social pathologies.

In other words, activists demand the impossible and then riot when their impossible demands aren’t met. Unless cooler heads prevail, they will continue to push our cities back to the brink, back to the bad old days when murder rates were so high that people openly wondered if our great urban communities were doomed to fail. Want to save our cities? Then reject the radicals. In the name of justice, they bring chaos. In the name of peace, they bring death.
 http://www.nationalreview.com/article/438992/milwaukee-riot-black-lives-matter-police-homicide-rate-khalif-rainey

 

Story 2:  Hillary Clinton Wants More of The Same Spending on Government Programs, More of The Status Quo — No Hope, No Change, More Government Dependency On The Road To Serfdom —  Videos

 

Joe Biden makes campaign trail debut

FULL SPEECH: Hillary Clinton campaign rally in Scranton, PA

FULL EVENT: Hillary Clinton & VP Joe Biden in Scranton – Donald Trump – Youngstown, “Radical Islam”

Donald Trump says Hillary Clinton wants to be America’s Angela Merkel – Youngstown, OH

Full Speech: Donald Trump Foreign Policy Speech in Youngstown, Ohio (August 15, 2016)

Full Event: Donald Trump Foreign Policy Speech in Youngstown, Ohio (August 15, 2016)

https://tpc.googlesyndication.com/safeframe/1-0-4/js/ext.js

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 732-736

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or Download Shows 713-719

Listen To Pronk Pops Podcast or Download Shows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 710, June 30, 2016, Part 2: Story 1: Trump Gives Outstanding Economic Policy Speech Using Teleprompter and Before Clinton and Big Lie Media Crushed Trash As Backdrop –How To Make America Wealthy Again — The American Worker vs. Global Elitists — Free Fair Trade and Fair Tax Less — Landslide Victory For Trump in November — Videos

Posted on June 30, 2016. Filed under: 2016 Presidential Campaign, 2016 Presidential Candidates, American History, Banking System, Blogroll, Breaking News, Bribery, British Pound, Budgetary Policy, College, Communications, Congress, Corruption, Countries, Crime, Culture, Currencies, Disasters, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Economics, Education, Elections, Empires, Employment, Euro, European History, European Union, Federal Government, Fiscal Policy, Foreign Policy, France, Free Trade, Gangs, Germany, Government, Government Spending, Great Britain, High Crimes, Hillary Clinton, History, House of Representatives, Illegal Immigration, Immigration, Investments, Labor Economics, Language, Law, Legal Immigration, Life, Media, Mexico, Mike Huckabee, Monetary Policy, Netherlands, News, Philosophy, Photos, Politics, Polls, Raymond Thomas Pronk, Senate, Social Networking, Socials Security, Syria, Tax Policy, Taxation, Taxes, Ted Cruz, Terror, Terrorism, Trade Policy, Transportation, Turkey, U.S. Dollar, Unemployment, United States Constitution, United States of America, Videos, Wall Street Journal, War, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 710: June 30, 2016

Pronk Pops Show 709: June 29, 2016

Pronk Pops Show 708: June 28, 2016

Pronk Pops Show 707: June 27, 2016

Pronk Pops Show 706: June 24, 2016

Pronk Pops Show 705: June 23, 2016

Pronk Pops Show 704: June 22, 2016

Pronk Pops Show 703: June 21, 2016

Pronk Pops Show 702: June 20, 2016

Pronk Pops Show 701: June 17, 2016

Pronk Pops Show 700: June 16, 2016

Pronk Pops Show 699: June 15, 2016

Pronk Pops Show 698: June 14, 2016

Pronk Pops Show 697: June 13, 2016

Pronk Pops Show 696: June 10, 2016

Pronk Pops Show 695: June 9, 2016

Pronk Pops Show 694: June 8, 2016

Pronk Pops Show 693: June 6, 2016

Pronk Pops Show 692: June 3, 2016

Pronk Pops Show 691: June 2, 2016

Pronk Pops Show 690: June 1, 2016

Pronk Pops Show 689: May 31, 2016

Pronk Pops Show 688: May 27, 2016

Pronk Pops Show 687: May 26, 2016

Pronk Pops Show 686: May 25, 2016

Pronk Pops Show 685: May 24, 2016

Pronk Pops Show 684: May 23, 2016

Pronk Pops Show 683: May 20, 2016

Pronk Pops Show 682: May 19, 2016

Pronk Pops Show 681: May 17, 2016

Pronk Pops Show 680: May 16, 2016

Pronk Pops Show 679: May 13, 2016

Pronk Pops Show 678: May 12, 2016

Pronk Pops Show 677: May 11, 2016

Pronk Pops Show 676: May 10, 2016

Pronk Pops Show 675: May 9, 2016

Pronk Pops Show 674: May 6, 2016

Pronk Pops Show 673: May 5, 2016

Pronk Pops Show 672: May 4, 2016

Pronk Pops Show 671: May 3, 2016

Pronk Pops Show 670: May 2, 2016

Pronk Pops Show 669: April 29, 2016

Pronk Pops Show 668: April 28, 2016

Pronk Pops Show 667: April 27, 2016

Pronk Pops Show 666: April 26, 2016

Pronk Pops Show 665: April 25, 2016

Pronk Pops Show 664: April 24, 2016

Pronk Pops Show 663: April 21, 2016

Pronk Pops Show 662: April 20, 2016

Pronk Pops Show 661: April 19, 2016

Pronk Pops Show 660: April 18, 2016

Pronk Pops Show 659: April 15, 2016

Pronk Pops Show 658: April 14, 2016

Pronk Pops Show 657: April 13, 2016

Pronk Pops Show 656: April 12, 2016

Pronk Pops Show 655: April 11, 2016

Pronk Pops Show 654: April 8, 2016

Pronk Pops Show 653: April 7, 2016

Pronk Pops Show 652: April 6, 2016

Pronk Pops Show 651: April 4, 2016

Pronk Pops Show 650: April 1, 2016

Pronk Pops Show 649: March 31, 2016

Pronk Pops Show 648: March 30, 2016

Pronk Pops Show 647: March 29, 2016

Pronk Pops Show 646: March 28, 2016

Pronk Pops Show 645: March 24, 2016

Pronk Pops Show 644: March 23, 2016

Pronk Pops Show 643: March 22, 2016

Pronk Pops Show 642: March 21, 2016

Pronk Pops Show 641: March 11, 2016

Pronk Pops Show 640: March 10, 2016

Pronk Pops Show 639: March 9, 2016

Pronk Pops Show 638: March 8, 2016

Pronk Pops Show 637: March 7, 2016

Pronk Pops Show 636: March 4, 2016

Part 2: Story 1:  Trump Gives Outstanding Economic Policy Speech Using Teleprompter and Before Clinton and Big Lie Media Crushed Trash As Backdrop –How To Make America Wealthy Again — The American Worker vs. Global Elitists —  Free Fair Trade and Fair Tax Less — Landslide Victory For Trump in November — Videos

trump-garbage

us tariff ratesTradeNov2014
world-commodities-map
SR-fed-spending-numbers-2012-p4-chart-4

Donald Trump Monessen Pennsylvania Alumisource Policy Speech Economy FULL STREAM HD [AMAZING]

FULL Donald Trump Delivers Economy Policy Speech! June 28th 2016 Part 1

Published on Jun 28, 2016

Tuesday, June 28, 2016: Live streaming coverage of Donald J. Trump’s policy speech in Monessen, PA at Alumisource. Coverage begins at 2:30 PM EDT.

– TUESDAY, JUNE 28, 2016 –

MONESSEN, PA
Alumisource
2:30 PM

Donald J. Trump for President Policy Speech
Donald John Trump (born June 14, 1946) is an American businessman, television personality, author, and politician. He is chairman of The Trump Organization, which is the principal holding company for his real estate ventures and other business interests. He is also the presumptive nominee of the Republican Party in the 2016 presidential election.

Trump graduated from the Wharton School of the University of Pennsylvania in 1968. Having worked in his father Fred Trump’s real estate and construction firm while attending college, he assumed control of that family business in 1973, later renaming it The Trump Organization. During his career, Trump has built hotels, casinos, golf courses, the Manhattan neighborhood Riverside South and numerous other developments, many of which bear his name, including Trump Entertainment Resorts (now owned by Carl Icahn). He has made the Trump name a valuable and distinct brand, licensing it to numerous enterprises in which he has minimal or no stake. He briefly sought the Reform Party’s nomination in the 2000 presidential election, withdrawing prior to any primary contests, although he won two primaries after his withdrawal. Listed by Forbes among the wealthiest 400 of The World’s Billionaires, Trump and his businesses, as well as his three marriages, have for decades received prominent media exposure. He hosted The Apprentice, a popular reality television show on NBC, from 2004 to 2015.

On June 16, 2015, Trump announced his candidacy for president as a Republican, and quickly emerged as the front-runner for his party’s nomination. His platform includes measures to combat illegal immigration, opposition to many free-trade agreements that he regards as unfair, often non-interventionist views on foreign policy, and a proposal to temporarily ban immigration to the United States from countries with a proven history of terrorism against the United States, until the government has perfected its ability to screen out potential terrorists. His statements in interviews and at campaign rallies have often been controversial, with the rallies sometimes accompanied by protests or riots.

FULL Donald Trump Delivers Economy Policy Speech! June 28th 2016 Part 2

FULL Donald Trump Delivers Economy Policy Speech! June 28th 2016 Part 3

Donald Trump’s 7-point trade plan: No TPP, renegotiate NAFTA

Conversation: The Strategy Behind China’s Currency Devaluation

The Bears Talk China’s Manipulated Currency

US trade deficit with China

Marc Faber On Yuan Devaluation, Fed Rate, Indian Economy & More

China’s Currency Manipulation is Harming America. Fair Trade Would Restore US Jobs and Prosperity

How Does China Manipulate Its Currency?

Keiser Report: Trump-Addicted America (E889)

fair tax

FairTax: Fire Up Our Economic Engine (Official HD)

The FairTax: It’s Time

What is the FairTax legislation?

What is the impact of the FairTax on business?

How is the FairTax different from a Value Added Tax (VAT)?

Congressman Woodall Discusses the FairTax

Dave Ramsey Supports the Fair Tax

Neal Boortz responds to White House re FAIRtax

Mike Huckabee – What is the “Fair Tax?”

FairTax explained – a 2 minute introduction

The Case for the Fair Tax

How will Social Security payments be calculated under the FairTax?

Freedom from the IRS! – FairTax Explained in Detail

Is NAFTA a success story or damaging policy?

Obama calls out Trump trade rhetoric

Obama On Trump’s Anti-Mexican Rhetoric

Gorka: Trump’s Populism ‘Is A Direct Response To Obama’s Divisive Presidency’

Milton Friedman – Deficits and Government Spending

Milton Friedman – A Limit On Spending

TAKE IT TO THE LIMITS: Milton Friedman on Libertarianism

Milton Friedman – Imports, Exports & Exchange Rates

Trump vs Friedman – Trade Policy Debate

Milton Friedman on Free Trade

Milton Friedman – Free Trade Vs Protectionism

Milton Friedman debates a protectionist

Milton Friedman on the Dangers of Protectionism (Obama’s recent tariff on Chinese imports

Gerald Celente 2016 Currency War, Trade War, Oil Prices & Bankism

The Legacy of the Smoot-Hawley Tariff Act

Lessons from the Great Depression

Lincoln’s Tariff War | by Thomas J. DiLorenzo

An In Depth Look at Southern Secession and American Principles part 4

An In Depth Look at Southern Secession and American Principles part 5

Tariffs: The Road to Civil War Part 1

Published on Jul 12, 2015

The South was 25% of the population and they were paying 80% of the taxes in the US which were being used to subsidize Northern industries. There is no way around that.

The declaration of secession included language from every faction including minority factions like slave owners who had a lot of money. Slavery wasn’t originally part of it. They pissed and moaned until they got everything included in it. These people were not the driving force of secession as secession and nullification movements started 30 years before the Civil War when slavery wasn’t even on the table. Furthermore slavery WASN’T on the table in the Civil War either. The North via New York and Ohio introduced a constitutional amendment, the Corwin Amendment which forbid the interference in slavery. Congress passed it too. It read : “No amendment shall be made to the Constitution which will authorize or give to Congress the power to abolish or interfere, within any State, with the domestic institutions thereof, including that of persons held to labor or service by the laws of said State.” It was not ratified because the South seceded anyway the two largest states did so AFTER Lincoln put a naval blockade on his own country to collect the import and export taxes.

The CSA constitution changed things that we accept today a) it gave term limits b)it gave a line item veto and c) section 8 (I) was changed to

“The Congress shall have power – To lay and collect taxes, duties, imposts, and excises for revenue, necessary to pay the debts, provide for the common defense, and carry on the Government of the Confederate States; but no bounties shall be granted from the Treasury; nor shall any duties or taxes on importations from foreign nations be laid to promote or foster any branch of industry; and all duties, imposts, and excises shall be uniform throughout the Confederate States”

. I will remind you that 5 Northern states also had slaves, actually they all allowed slaves just not as to scale as the south. Other Northern States forbid foreign blacks from even entering the state such as Lincolns home state and the black code laws. And the 13th amendment which freed the slaves was rejected by 3 northern states and only 1 southern state. Let’s think they just lost 400,000 people to free the slaves then vote against freeing the slaves? It was never about slavery. It was about as Lincoln said “preserving the union” Lincoln didn’t even bring up the issue of slaves until the middle of the war.

Lincoln said “There is a natural disgust in the minds of nearly all white people to the idea of indiscriminate amalgamation of the white and black races … A separation of the races is the only perfect preventive of amalgamation, but as an immediate separation is impossible, the next best thing is to keep them apart where they are not already together. If white and black people never get together in Kansas, they will never mix blood in Kansas …”

He also said “I have no purpose to introduce political and social equality between the white and black races. There is physical difference between the two which, in my judgment, will probably forever forbid their living together upon the footing of perfect equality, and inasmuch as it becomes a necessity that there must be a difference, I, as well as Judge Douglas, am in favor of the race to which I belong having the superior position.”

And he said “Our republican system was meant for a homogeneous people. As long as blacks continue to live with the whites they constitute a threat to the national life. Family life may also collapse and the increase of mixed breed bastards may some day challenge the supremacy of the white man.”

And pay attention to this Lincoln said ” I HAVE NO PURPOSE DIRECTLY OR INDIRECTLY TO INTERFERE WITH THE INSTITUTION OF SLAVERY IN THE STATES WHERE IT EXIST. I believe I have no lawful right to do so, and I have no inclination to do so.”

And “My paramount object in this struggle is to save the Union, and is not either to save or destroy Slavery. If I could save the Union without freeing any slave, I would do it, and if I could save it by freeing all the slaves, I would do it, and if I could save it by freeing some and leaving others alone, I would also do that.” -Abe Lincoln your white separatist hero.

Tariffs: The Road to Civil War Part 2

Real Causes of “The Civil War”– Morrill tariff

 

Donald J. Trump Address: Declaring American Economic Independence

AddThis Sharing Buttons

Today, Donald J. Trump spoke at the Alumisource Factory in Monessen, Pennsylvania. Mr. Trump’s speech focused on how to rebuild the American economy by fighting for fair trade. The middle class has collapsed because of the failed policies from Washington, D.C. that benefit the politicians, but not the American people. The all talk, no action politicians have promoted globalization at the expense of American workers. Mr. Trump will fight to put the country and its workers first in order to Make America Great Again. A transcript of the remarks can be viewed via the link below:

Declaring American Economic Independence
https://assets.donaldjtrump.com/DJT_DeclaringAmericanEconomicIndependence.pdf

———————————————————————————

Trump Campaign Announces Expansion of Team

Today, Donald J. Trump announced the expansion of his campaign team making several appointments as he continues to build his operations in advance of the general elections.

Jason Miller will serve as Senior Communications Advisor, where he will work with the existing team to build out a full Communications Department to deliver victory this November. Mr. Miller will work with several areas of the campaign to ensure messaging coordination and implementation. Mr. Miller has managed campaigns and shaped messages for successful House, Senate and gubernatorial races in addition to serving on the senior staffs of two presidential campaigns.

Trumppenn

Michael Abboud is joining the Trump Campaign as a Communications Coordinator. Formerly with the RNC Communications Department, Mr. Abboud will work to execute the campaign’s rapid response and daily messaging, as well as providing candidate briefings on daily news and breaking stories.

Alan Cobb will serve as the Director of Coalitions for the campaign, organizing and managing the numerous coalition groups that currently support, and will support, Mr. Trump for president. Previously, Mr. Cobb served in several roles for the Trump Campaign including as a Senior Advisor. Mr. Cobb managed statewide, political and issue campaigns, served as the Deputy State Director for U.S. Senators Bob Dole and U.S. Senator Sheila Frahm and served as a Campaign Advisor to the 2014 campaigns of Congressman Mike Pompeo and Senator Pat Roberts.

On the appointments, Mr. Trump stated, “As we continue to work to defeat Hillary Clinton this November, I am constantly building a superior political team. After winning the most votes in the history of a Republican primary contest, we are taking our messages to the people so that we can Make American Great Again.”

Donald Trump starts a trade war — with the Republican Party

June 30 

The unusual battle between Donald Trump and much of the Republican establishment on international trade is rapidly escalating, as the presumptive GOP nominee rails against business groups and members of his own party while defenders of sweeping free-trade pacts rebuke him.The rift deepened on Thursday when Trump called out the U.S. Chamber of Commerce by name for the second straight day and pilloried the North American Free Trade Agreement and the ­Trans-Pacific Partnership, two landmark trade agreements broadly supported by Republicans.“I’m messing with bad deals that we could make good,” Trump said in his speech at a shuttered manufacturing plant in Manchester, N.H. “I could make good deals. Why would somebody fight that? I mean, the U.S. Chamber fights. They said, ‘Oh, Trump wants to stop free trade.’ I don’t want to stop free trade. I love free trade, but I want to make great deals.”

The mogul’s comments followed a flurry of insults throughout the week aimed at advocates of broad trade accords, which have been championed by Republican leaders for decades as crucial engines of capitalism. Trump accused TPP backers, for example, of wanting to “rape” the United States.

For Trump, feuding with powerful business interests makes him an attractive candidate for many disaffected working-class voters, including some who have supported Democrats in the past.

But the loud dispute also risks alienating many of the Republican Party’s wealthy benefactors at a time when he is struggling to kick his long-dormant fundraising operation into gear. A stridently protectionist message could also push some moderate Main Street Republicans to support Democratic rival Hillary Clinton, in much the same way that many Republicans in the foreign policy world have done.

Many business groups, which generally favor looser trade restrictions and are traditional Republican allies, have taken sharp issue with Trump’s latest comments and appear determined to rebut them.

“While we never endorse in the presidential race, we do plan to be aggressive in presidential policy with both major party nominees,” said Scott Reed, the senior political strategist at the Chamber of Commerce. The group repudiated Trump in real time on Tuesday in a series of tweets as he delivered an address threatening to tear up trade accords and impose tariffs.

Trump has long blamed broad trade agreements for harming U.S. workers. But this week has marked a rhetorical shift as he aggressively casts members of both parties who have supported trade deals as anti-American and in league with “special interests.” For many Republicans in particular, the rhetoric amounts to an assault on core ideological beliefs that have undergirded conservative economic policy for generations.

The candidate’s arguments have also left an opening for sharp attacks by Clinton and other Democrats accusing him of hypocrisy. Trump in the past has talked favorably about outsourcing jobs overseas, and much of his Trump-branded apparel line and other products are manufactured in low-cost Asian countries.

“Donald Trump is running as an anti-Republican Republican in many ways,” said David French, senior vice president of government relations at the National Retail Federation, which like the Chamber of Commerce is not taking sides in the presidential contest. French said Trump’s commentary on trade has been disappointing.

Some business leaders are privately pessimistic that publicly fighting Trump hard on trade will be a winning proposition. His access to free media coverage through television and radio interviews presents a big obstacle to anyone standing in his way.

It also remains to be seen how and if these groups will escalate their fight beyond social media and chastising in the news media. The Chamber of Commerce, for example, is focused heavily on down-ballot contests and, given that the group primarily supports Republicans, could end up helping Trump regardless.

As Trump spoke Thursday, he stood in front of a manufacturing facility that closed in 2014, causing more than 130 workers to lose their jobs. He continued to tout his protectionist economic policies, which he has underscored since the day he launched his campaign more than a year ago and which stand at odds with many pro-free-trade statements in his past.

Trump’s repeated needling of the Chamber of Commerce, which is the nation’s largest business lobby, signaled that he has found a new favorite target. During a rally in Maine on Wednesday, Trump accused the organization of being “totally controlled by the special-interest groups.”

The mogul continued his assault on social media a few hours later, tweeting, “For reasons only they can explain, the @USChamber wants to continue our bad trade deals rather than renegotiating and making them better.”

Trump has repeatedly blamed outsourcing and big trade agreements for domestic economic decline. He has vowed to renegotiate NAFTA as president and withdraw the United States from TPP — promises many experts in both parties call unrealistic and highly risky.

But such talk has won Trump legions of fans in the economically depressed Rust Belt and other areas suffering from the effects of globalization. His allies hope it will help him compete in Ohio and Pennsylvania, two key swing states.

Trump’s repeated talk about trade is aimed in large part at undermining Clinton, whose husband signed NAFTA as president. Trump also accuses Clinton of waffling on TPP, which she praised as secretary of state but then opposed during her hard-fought primary contest with Sen. Bernie Sanders of Vermont.

“The trade policies of Hillary Clinton, global financiers — and they’re all controlling her, they have 100 percent, they might as well stamp Hillary Clinton on their forehead,” he said Thursday.

Clinton and other Democrats have pushed back by pointing to the ways that Trump has benefited from the policies he now condemns. On Thursday, Clinton issued a tweet listing the countries, from Mexico to Bangladesh, where Trump-branded ties and shirts were made.

While Trump insists he is not trying to challenge free-trade principles, he has repeatedly argued that it is more important for the United States to have “fair trade” agreements. He has said that he would prefer to negotiate deals one-on-one with countries rather than enter into multi-national settlements.

Trump has repeatedly vowed to impose high tariffs — or the threat of high tariffs — to bully American companies into keeping jobs in the United States. His favorite example is Ford Motor Co., which plans to build a massive plant in Mexico. Trump has said that before he takes office he will persuade Ford to change course by threatening to charge the company a 35 percent tax on cars imported back into the United States.

Trump took a handful of questions from the audience Thursday, including one from a man who used to work at a factory that made police badges but lost that business when departments started ordering from overseas.

“What are you going to do for us?” the man asked, as the small crowd applauded.

“First of all, your story is common to thousands and thousands of companies throughout this country,” Trump said, before promising to fight currency ma­nipu­la­tion, which he says makes it impossible for U.S. companies to compete with those based in China and elsewhere.

Trump repeatedly said that while making products within the United States might be a bit more expensive, it’s worth the cost to have more jobs based here.

Another man asked Trump how he will respond to the corporate backlash to his trade policies.

“Corporations? I’m not worried about it,” Trump said, pointing out that his tax plan is “cutting business taxes way down” and that he will make it less expensive for companies to temporarily bring their money back from overseas.

“We will do things that are going to be so miraculous — and it’ll be fast. It won’t take a long period of time,” Trump said.

Jose A. DelReal contributed to this report.

https://www.washingtonpost.com/politics/donald-trump-starts-a-trade-war–with-the-republican-party/2016/06/30/25eec89a-3eda-11e6-84e8-1580c7db5275_story.html

 

Morrill Tariff

From Wikipedia, the free encyclopedia

The Morrill Tariff of 1861 was an increased import tariff in the United States, adopted on March 2, 1861, during the administration of President James Buchanan, a Democrat. It was the twelfth of seventeen planks in the platform of the incoming Republican Party, which had not yet been inaugurated, and it appealed to industrialists and factory workers as a way to foster rapid industrial growth.[1]

It was named for its sponsor, Representative Justin Smith Morrill of Vermont, who drafted it with the advice of Pennsylvania economist Henry Charles Carey. The passage of the tariff was possible because many tariff-averse Southerners had resigned from Congress after their states declared their secession. The Morrill Tariff raised rates to encourage industry and to foster high wages for industrial workers.[2] It replaced the low Tariff of 1857, which was written to benefit the South. Two additional tariffs sponsored by Morrill, each one higher, were passed during Abraham Lincoln‘s administration to raise urgently needed revenue during the Civil War.

The Morrill tariff inaugurated a period of continuous trade protection in the United States, a policy that remained until the adoption of the Revenue Act of 1913 (the Underwood tariff). The schedule of the Morrill Tariff and its two successor bills were retained long after the end of the Civil War.

History

Origins

A high tariff to encourage the development of domestic industry had been advocated for many years, especially by the Whig Party and its long-time leader Henry Clay. They enacted such a tariff in 1842, but in 1846 the Democrats enacted the Walker Tariff, cutting tariff rates substantially. The Democrats cut rates even further in the Tariff of 1857, which was highly favorable to the South.

Meanwhile, the Whig Party broke up, and this element of the Whig program was taken up by the new Republican Party, which ran its first national ticket in 1856. Some former Whigs from the Border States and upper South remained in Congress as “Opposition”, “Unionist”, or “American” (Know Nothing) members; they also supported higher tariffs.

The Panic of 1857 led to calls for protectionist tariff revision. Well-known economist Henry C. Carey blamed the Panic on the Tariff of 1857. His opinion was widely circulated in the high tariff (or “protectionist”) media.

Efforts to revise the tariff schedules upward began in earnest in the 35th Congress of 1857–1859. Two proposals were submitted in the House. House Ways and Means Committee chairman John S. Phelps (D-Missouri wrote the Democrats’ plan, which retained most of the low rates of the 1857 Tariff, with minor revisions to stimulate revenue.

Minority Ways and Means members Morrill and Henry Winter Davis (a Maryland “American”) produced the Republican proposal, an upward revision of the tariff schedule. It replaced the existing ad valorem tariff schedule with specific duties and drastically increased tariff rates on goods produced by popular “protected” industries, such as iron, textiles, and other manufactured goods. Economic historian Frank Taussig argued that in many cases, the substitution of specific duties was used to disguise the extent of the rate increases.[3] Supporters of the specific rates argued that they were necessary, though, because European exporters were routinely providing their American customers with phony invoices showing lower prices for goods than were actually paid. Specific rates made such subterfuge pointless.

However, the House took no action on either tariff bill during the 35th Congress.

House actions

When the 36th Congress met in 1859, action remained blocked by a wrangle over the Speaker of the House until 1860, when Republican William Pennington of New Jersey was elected. A pro-tariff Republican majority was appointed to Ways and Means, and John Sherman of Ohio became chairman.

The Morrill bill was passed out of committee and brought up for a floor vote near the end of first session of the Congress (December 1859 – June 1860).

The vote was on May 10, 1860; the bill passed by a vote of 105 to 64.[4]

The vote was largely but not entirely sectional. Republicans, all from the northern states, voted 89–2 for the bill. They were joined by 7 northern Democrats from New York, New Jersey, and Pennsylvania. Five of these were “anti-Lecompton Democrats” (dissident Democrats who opposed the pro-slavery Lecompton constitution for Kansas).

14 northern Democrats voted against the bill.

In the Border States, 4 “Opposition” Representatives from Kentucky voted for it, as did its co-sponsor Winter of Maryland, a Maryland “Unionist”, and a Democrat from Delaware. 8 Border state Democrats and an “American” from Missouri voted no.

35 southern Democrats and 3 Oppositionists voted against it; one Oppositionist from Tennessee voted for it.

Thus the sectional breakdown was 96–15 in the north, 7–9 in the Border, and 1–39 in the south.

There were 55 abstentions, including 13 Republicans, 12 northern Democrats, 13 southern Democrats, and 8 southern “Oppositionists” and “Americans”. (The remaining Representatives were mostly “paired” with opposing Representatives who could not be present.[5]

Senate action

The Morrill bill was sent on to the Senate. However, the Senate was controlled by Democrats, and so the bill was bottled up in the Finance Committee, chaired by Robert M. T. Hunter of Virginia.

This insured that the Senate vote would be put off till the second session in December. It also meant that the tariff would be a prominent issue in the 1860 election.[6]

1860 election

The Republican party included a strong pro-tariff plank in its 1860 platform. They also sent prominent tariff advocates such as Morrill and Sherman to campaign in Pennsylvania and New Jersey, where the tariff was popular, by touting the Morrill bill. Both Democratic candidates, John C. Breckinridge and Stephen Douglas, opposed all high tariffs and protectionism in general.[7]

Historian Reinhard H. Luthin documents the importance of the Morrill Tariff to the Republicans in the 1860 presidential election.[8] Abraham Lincoln’s record as a protectionist and support for the Morrill Tariff bill, he notes, helped him to secure support in the important electoral college state of Pennsylvania, as well as neighboring New Jersey. Lincoln carried Pennsylvania handily in November, as part of his sweep of the North.

On February 14, 1861, President-elect Lincoln told an audience in Pittsburgh that he would make a new tariff his priority in the next session if the bill did not pass by inauguration day on March 4.

Renewed Senate action

The second session of the 36th Congress began in December 1860. At first it appeared that Hunter would keep the Morrill bill tabled until the end of the term in March.

However, in December 1860 and January 1861, seven southern states declared secession, and their low-tariff Senators withdrew. Republicans took control of the Senate in February, and Hunter lost his hold on the Finance Committee.

Meanwhile, the Treasury was in financial crisis, with less than $500,000 on hand and millions in unpaid bills. The Union urgently needed new revenue. A recent historian concludes, “the impetus for revising the tariff arose as an attempt to augment revenue, stave off ‘ruin,’ and address the accumulating debt.”[9]

The Morrill bill was brought to the Senate floor for a vote on February 20, and passed 25 to 14. The vote was split almost completely down party lines. It was supported by 24 Republicans and Democrat William Bigler of Pennsylvania. It was opposed by 10 Southern Democrats, 2 Northern Democrats, and 2 Far West Democrats. 12 Senators abstained, including 3 Northern Democrats, 1 California Democrat, 5 Southern Democrats, 2 Republicans, and 1 Unionist from Maryland.[10]

There were some minor amendments related to the tariffs on tea and coffee, which required a conference committee with the House, but these were resolved and the final bill was approved by unanimous consent on March 2.

Though a Democrat himself, outgoing President James Buchanan favored the bill because of the interests of his home state, Pennsylvania. He signed the bill into law as one of his last acts in office.

Adoption and amendments

The Morrill Tariff took effect one month after it was signed into law. Besides setting tariff rates, the bill altered and restricted the Warehousing Act of 1846.

The Morrill Tariff was drafted and passed the House before the Civil War began or was even expected, and was passed by the Senate almost unchanged. Thus it should not be considered “Civil War” legislation.[11]

In fact, the Tariff proved to be too low for the revenue needs of the Civil War, and was quickly supplanted by the Second Morrill Tariff, or Revenue Act of 1861, later that fall.[12]

Impact

In its first year of operation, the Morrill Tariff increased the effective rate collected on dutiable imports by approximately 70%. In 1860 American tariff rates were among the lowest in the world and also at historical lows by 19th century standards, the average rate for 1857 through 1860 being around 17% overall (ad valorem), or 21% on dutiable items only. The Morrill Tariff immediately raised these averages to about 26% overall or 36% on dutiable items, and further increases by 1865 left the comparable rates at 38% and 48%. Although higher than in the immediate antebellum period, these rates were still significantly lower than between 1825 and 1830, when rates had sometimes been over 50%.[13]

The United States needed $3 billion to pay for the immense armies and fleets raised to fight the Civil War — over $400 million just in 1862. The chief source of Federal revenue had been the tariff revenues. Therefore, Secretary of the Treasury Salmon P. Chase, though a long-time free-trader, worked with Morrill to pass a second tariff bill in summer 1861, raising rates another 10 points in order to generate more revenues.[14] These subsequent bills were primarily revenue driven to meet the war’s needs, though they enjoyed the support of protectionists such as Carey, who again assisted Morrill in the bill’s drafting.

However, the tariff played only a modest role in financing the war. It was far less important than other measures, such as $2.8 billion in bond sales and some printing of Greenbacks. Customs revenue from tariffs totaled $345 million from 1861 through 1865, or 43% of all federal tax revenue, while military spending totalled $3,065 million.[15]

Reception abroad

The Morrill Tariff was met with intense hostility in Britain, where the free trade movement dominated public opinion. Southern diplomats and agents sought to use British ire towards the Morrill Tariff in order to garner sympathy, with the aim of obtaining British recognition for the Confederacy.[16] The new tariff schedule heavily penalized British iron, clothing, and manufactured exports with new taxes and sparked public outcry from many British politicians. The expectation of high tax rates probably caused British shippers to hasten their deliveries before the new rates took effect in the early summer of 1861. When complaints were heard from London, Congress counterattacked. The Senate Finance Committee chairman snapped, “What right has a foreign country to make any question about what we choose to do?”[17]

When the American Civil War broke out in 1861, British public opinion was sympathetic to the Confederacy, in part because of lingering agitation over the tariff. As one diplomatic historian has explained, the Morrill Tariff:[18]

“Not unnaturally gave great displeasure to England. It greatly lessened the profits of the American markets to English manufacturers and merchants, to a degree which caused serious mercantile distress in that country. Moreover, the British nation was then in the first flush of enthusiasm over free trade, and, under the lead of extremists like Cobden and Gladstone, was inclined to regard a protective tariff as essentially and intrinsically immoral, scarcely less so than larceny or murder. Indeed, the tariff was seriously regarded as comparable in offensiveness with slavery itself, and Englishmen were inclined to condemn the North for the one as much as the South for the other. “We do not like slavery,” said Palmerston to Adams, “but we want cotton, and we dislike very much your Morrill tariff.”

Many prominent British writers condemned the Morrill Tariff in the strongest terms. Economist William Stanley Jevons denounced it as a “retrograde” law. The well known novelist Charles Dickens used his magazine, All the Year Round, to attack the new tariff. On December 28, 1861 Dickens published a lengthy article, believed to be written by Henry Morley,[19] which blamed the American Civil War on the Morrill Tariff:

If it be not slavery, where lies the partition of the interests that has led at last to actual separation of the Southern from the Northern States? …Every year, for some years back, this or that Southern state had declared that it would submit to this extortion only while it had not the strength for resistance. With the election of Lincoln and an exclusive Northern party taking over the federal government, the time for withdrawal had arrived … The conflict is between semi-independent communities [in which] every feeling and interest [in the South] calls for political partition, and every pocket interest [in the North] calls for union … So the case stands, and under all the passion of the parties and the cries of battle lie the two chief moving causes of the struggle. Union means so many millions a year lost to the South; secession means the loss of the same millions to the North. The love of money is the root of this, as of many other evils… [T]he quarrel between the North and South is, as it stands, solely a fiscal quarrel.

Communist philosopher Karl Marx was among the few writers in Britain who saw slavery as the major cause of the war. Marx wrote extensively in the British press and served as a London correspondent for several North American newspapers including Horace Greeley’s New York Tribune. Marx reacted to those who blamed the war on Morrill’s bill, arguing instead that slavery had induced secession and that the tariff was just a pretext. Marx wrote, in October 1861:

Naturally, in America everyone knew that from 1846 to 1861 a free trade system prevailed, and that Representative Morrill carried his protectionist tariff through Congress only in 1861, after the rebellion had already broken out. Secession, therefore, did not take place because the Morrill tariff had gone through Congress, but, at most, the Morrill tariff went through Congress because secession had taken place.[20]

Legacy

According to historian Heather Cox Richardson, Morrill intended to offer protection to both the usual manufacturing recipients and a broad group of agricultural interests. The purpose was to appease interests beyond the northeast, which traditionally supported protection. For the first time protection was extended to every major farm product.

Planning to distribute the benefits of a tariff to all sectors of the economy, and also hoping to broaden support for his party, Morrill rejected the traditional system of protection by proposing tariff duties on agricultural, mining, and fishing products, as well as on manufactures. Sugar, wool, flaxseed, hides, beef, pork, corn, grain, hemp, wool, and minerals would all be protected by the Morrill Tariff. The duty on sugar might well be expected to appease Southerners opposed to tariffs, and, notably, wool and flaxseed production were growing industries in the West. The new tariff bill also would protect coal, lead, copper, zinc, and other minerals, all of which the new northwestern states were beginning to produce. The Eastern fishing industry would receive a duty on dried, pickled, and salted fish. “In adjusting the details of a tariff,” Morrill explained with a rhetorical flourish in his introduction of the bill, “I would treat agriculture, manufactures, mining, and commerce, as I would our whole people—as members of one family, all entitled to equal favor, and no one to be made the beast of burden to carry the packs of others.”[21]

According to Taussig, “Morrill and the other supporters of the act of 1861 declared that their intention was simply to restore the rates of 1846.” However, he also gives reason to suspect that the bill’s motives were intended to put high rates of protection on iron and wool to attract states in the West and in Pennsylvania:

“The important change which they (the sponsors) proposed to make from the provisions of the tariff of 1846 was to substitute specific for ad-valorem duties. Such a change from ad-valorem to specific duties is in itself by no means objectionable; but it has usually been made a pretext on the part of protectionists for a considerable increase in the actual duties paid. When protectionists make a change of this kind, they almost invariably make the specific duties higher than the ad-valorem duties for which they are supposed to be an equivalent…The Morrill tariff formed no exception to the usual course of things in this respect. The specific duties which it established were in many cases considerably above the ad-valorem duties of 1846. The most important direct changes made by the act of 1861 were in the increased duties on iron and on wool, by which it was hoped to attach to the Republican party Pennsylvania and some of the Western States”[22]

Henry Carey, who assisted Morrill while drafting the bill and was one of its most vocal supporters, strongly emphasized its importance to the Republican Party in his January 2, 1861 letter to Lincoln. Carey told the President-Elect “the success of your administration is wholly dependent upon the passage of the Morrill bill at the present session.” According to Carey:

“With it, the people will be relieved — your term will commence with a rising wave of prosperity — the Treasury will be filled and the party that elected you will be increased and strengthened. Without it, there will be much suffering among the people — much dissatisfaction with their duties — much borrowing on the part of the Government — & very much trouble among the Republican Party when the people shall come to vote two years hence. There is but one way to make the Party a permanent one, & that is, by the prompt repudiation to the free trade system.”

Congressman John Sherman later wrote:

The Morrill tariff bill came nearer than any other to meeting the double requirement of providing ample revenue for the support of the government and of rendering the proper protection to home industries. No national taxes, except duties on imported goods, were imposed at the time of its passage. The Civil War changed all this, reducing importations and adding tenfold to the revenue required. The government was justified in increasing existing rates of duty, and in adding to the dutiable list all articles imported, thus including articles of prime necessity and of universal use. In addition to these duties, it was compelled to add taxes on all articles of home production, on incomes not required for the supply of actual wants, and, especially, on articles of doubtful necessity, such as spirits, tobacco and beer. These taxes were absolutely required to meet expenditures for the army and navy, for the interest on the war debts and just pensions to those who were disabled by the war, and to their widows and orphans.[23]

Secession and tariffs

The Morrill Tariff and the secession movement

The Morrill tariff was adopted against the backdrop of the secession movement, and provided an issue for secessionist agitation in some southern states. The law’s critics compared it to the 1828 Tariff of Abominations that sparked the Nullification Crisis, although its average rate was significantly lower.

Slavery dominated the secession debate in the southern states,[24] but the Morrill Tariff was addressed in the conventions of Georgia and South Carolina.

Robert Barnwell Rhett similarly railed against the then-pending Morrill Tariff before the South Carolina convention. Rhett included a lengthy attack on tariffs in the Address of South Carolina to Slaveholding State19s, which the convention adopted on December 25, 1860 to accompany its secession ordinance.

And so with the Southern States, towards the Northern States, in the vital matter of taxation. They are in a minority in Congress. Their representation in Congress, is useless to protect them against unjust taxation; and they are taxed by the people of the North for their benefit, exactly as the people of Great Britain taxed our ancestors in the British parliament for their benefit. For the last forty years, the taxes laid by the Congress of the United States have been laid with a view of subserving the interests of the North. The people of the South have been taxed by duties on imports, not for revenue, but for an object inconsistent with revenue— to promote, by prohibitions, Northern interests in the productions of their mines and manufactures.[25]

The Morrill Tariff played less prominently elsewhere in the South. In some portions of Virginia, secessionists promised a new protective tariff to assist the state’s fledgling industries.[26]

In the North, enforcement of the Morrill Tariff contributed to support for the Union cause among industrialists and merchant interests. Speaking of this class, the abolitionist Orestes Brownson derisively remarked that “the Morrill Tariff moved them more than the fall of Sumter.”[27] In one such example the New York Times, which had previously opposed Morrill’s bill on free trade grounds, editorialized that the tariff imbalance would bring commercial ruin to the North and urged its suspension until the secession crisis passed. “We have imposed high duties on our commerce at the very moment the seceding states are inviting commerce to their ports by low duties.”[28] As secession became more evident and the fledgling Confederacy adopted a much lower tariff of its own, the paper urged military action to enforce the Morrill Tariff in the Southern states.[29]

Historiography

Historians, James Huston notes, have been baffled by the role of high tariffs in general and have offered multiple conflicting interpretations over the years. (Low tariffs, all historians agree, were noncontroversial and were needed to fund the federal government.) One school of thought says the Republicans were the willing tools of would-be monopolists. A second schools says the Republicans truly believed tariffs would promote nationalism and prosperity for everyone along with balanced growth in every region (as opposed to growth only in the cotton South). A third school emphasizes the undeniable importance of the tariff in cementing party loyalty, especially in industrial states. Another approach emphasizes that factory workers were eager for high tariffs because it protected their high wages from European competition.[30]

Charles A. Beard argued in the 1920s that very long-term economic issues were critical, with the pro-tariff industrial Northeast forming a coalition with the anti-tariff agrarian Midwest against the plantation South. According to Luthin in the 1940s, “Historians are not unanimous as to the relative importance which Southern fear and hatred of a high tariff had in causing the secession of the slave states.”[31] However, none of the statesmen seeking a compromise in 1860-61 that would avert the war ever suggested the tariff might be the key to a solution, or might be a cause of the secession.[32] Beginning in the 1950s, historians moved away from the Beard thesis of economic causality. In its place, historians led by Richard Hofstadter began to emphasize the social causes of the war, centered around the issue of slavery. The Beard thesis has enjoyed a recent revival among economists, pro-Confederate historians, and neo-Beardian scholars. A 2002 study by economists Robert McGuire and T. Norman Van Cott concluded:

A de facto constitutional mandate that tariffs lie on the lower end of the Laffer relationship means that the Confederacy went beyond simply observing that a given tax revenue is obtainable with a “high” and “low” tax rate, a la Alexander Hamilton and others. Indeed, the constitutional action suggests that the tariff issue may in fact have been even more important in the North–South tensions that led to the Civil War than many economists and historians currently believe.”

Rather than contributing to secession, Marc-William Palen notes how the tariff was only able to pass through Congress following the secession of Southern states. Thus, secession itself allowed for the bill’s passage, rather than the other way around.[33]Allan Nevinsand James M. McPherson downplay the significance of the tariff, arguing that it was peripheral to the issue of slavery. They note that slavery dominated the secessionist declarations, speeches, and pamphlets. Nevins also points to the argument of Alexander Stephens, who disputed Toombs’ claims about the severity of the Morrill tariff. Though initially a unionist, Stephens would later cite slavery as the “cornerstone” reason behind his support of the secessionist cause.[34]

https://en.wikipedia.org/wiki/Morrill_Tariff

 

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 705-710

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

 

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 474, May 29, 2015, Story 1, Part 2 of 3: An American Renaissance, The Road To Peace and Prosperity: Faith, Family, Friends, and Freedom ~ First — Videos

Posted on June 1, 2015. Filed under: American History, Blogroll, Budgetary Policy, Business, Communications, Computers, Congress, Defense Spending, Economics, Education, Federal Government, Fiscal Policy, Foreign Policy, Government, Government Dependency, Government Spending, Health Care, Health Care Insurance, History, Illegal Immigration, Immigration, Investments, Labor Economics, Media, Medicare, Monetary Policy, Obama, Philosophy, Photos, Politics, Radio, Raymond Thomas Pronk, Scandals, Security, Social Science, Social Security, Socials Security, Tax Policy, Taxation, Taxes, Unemployment, United States Constitution, Videos, Wealth, Welfare Spending, Wisdom | Tags: , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 474 May 29, 2015

Pronk Pops Show 473 May 28, 2015

Pronk Pops Show 472 May 27, 2015

Pronk Pops Show 471 May 26, 2015

Pronk Pops Show 470 May 22, 2015

Pronk Pops Show 469 May 21, 2015

Pronk Pops Show 468 May 20, 2015 

Pronk Pops Show 467 May 19, 2015

Pronk Pops Show 466 May 18, 2015

Pronk Pops Show 465 May 15, 2015

Pronk Pops Show 464 May 14, 2015

Pronk Pops Show 463 May 13, 2015

Pronk Pops Show 462 May 8, 2015

Pronk Pops Show 461 May 7, 2015

Pronk Pops Show 460 May 6, 2015

Pronk Pops Show 459 May 4, 2015 

Pronk Pops Show 458 May 1, 2015 

Pronk Pops Show 457 April 30, 2015 

Pronk Pops Show 456: April 29, 2015 

Pronk Pops Show 455: April 28, 2015

Pronk Pops Show 454: April 27, 2015

Pronk Pops Show 453: April 24, 2015

Pronk Pops Show 452: April 23, 2015 

Pronk Pops Show 451: April 22, 2015

Pronk Pops Show 450: April 21, 2015

Pronk Pops Show 449: April 20, 2015

Pronk Pops Show 448: April 17, 2015

Pronk Pops Show 447: April 16, 2015

Pronk Pops Show 446: April 15, 2015

Pronk Pops Show 445: April 14, 2015

Pronk Pops Show 444: April 13, 2015

Pronk Pops Show 443: April 9, 2015

Pronk Pops Show 442: April 8, 2015

Pronk Pops Show 441: April 6, 2015

Pronk Pops Show 440: April 2, 2015

Pronk Pops Show 439: April 1, 2015

Pronk Pops Show 438: March 31, 2015

Pronk Pops Show 437: March 30, 2015 

Pronk Pops Show 436: March 27, 2015 

Pronk Pops Show 435: March 26, 2015

Pronk Pops Show 434: March 25, 2015

Pronk Pops Show 433: March 24, 2015

Pronk Pops Show 432: March 23, 2015

Pronk Pops Show 431: March 20, 2015

Pronk Pops Show 430: March 19, 2015

Pronk Pops Show 429: March 18, 2015

Pronk Pops Show 428: March 17, 2015 

Pronk Pops Show 427: March 16, 2015

Pronk Pops Show 426: March 6, 2015

Pronk Pops Show 425: March 4, 2015

Pronk Pops Show 424: March 2, 2015

Pronk Pops Show 423: February 26, 2015

Pronk Pops Show 422: February 25, 2015 

Pronk Pops Show 421: February 20, 2015

Pronk Pops Show 420: February 19, 2015

Pronk Pops Show 419: February 18, 2015

Pronk Pops Show 418: February 16, 2015

Pronk Pops Show 417: February 13, 2015

Pronk Pops Show 416: February 12, 2015

Pronk Pops Show 415: February 11, 2015

Pronk Pops Show 414: February 10, 2015

Pronk Pops Show 413: February 9, 2015

Pronk Pops Show 412: February 6, 2015

Pronk Pops Show 411: February 5, 2015

Pronk Pops Show 410: February 4, 2015

Pronk Pops Show 409: February 3, 2015

Pronk Pops Show 408: February 2, 2015

 Story 1, Part 2 of 3: An American Renaissance, The Road To Peace and Prosperity: Faith, Family, Friends, and Freedom ~ First — Videos

Part 2

US Debt Clock.org

http://www.usdebtclock.org/

Ep. 12: AN ANIMATED FILM ON THE DEBT & THE DEFICIT | Marshall Curry

US Debt Crisis – Perfectly Explained

The Collapse of The American Dream Explained in Animation

George Carlin on the American Dream

chart

The bar chart comes directly from the Monthly Treasury Statement published by the U. S. Treasury Department..The “Debt Total” bar chart is generated from the Treasury Department’s “Debt Report” found on the Treasury Direct web site. It has links to search the debt for any given date range, and access to debt interest information. It is a direct source to government provided budget information.

“Deficit” vs. “Debt”—Suppose you spend more money this month than your income. This situation is called a “budget deficit”. So you borrow (ie; use your credit card). The amount you borrowed (and now owe) is called your debt. You have to pay interest on your debt. If next month you spend more than your income, another deficit, you must borrow some more, and you’ll still have to pay the interest on your debt (now larger). If you have a deficit every month, you keep borrowing and your debt grows. Soon the interest payment on your loan is bigger than any other item in your budget. Eventually, all you can do is pay the interest payment, and you don’t have any money left over for anything else. This situation is known as bankruptcy.

“Reducing the deficit” is a meaningless soundbite. If theDEFICIT is any amount more than ZERO, we have to borrow more and the DEBT grows.

Each year since 1969, Congress has spent more money than its income. The Treasury Department has to borrow money to meet Congress’s appropriations. Here is a direct link to the Congressional Budget Office web site’s deficit analysis. We have to pay interest* on that huge, growing debt; and it dramatically cuts into our budget.

2016-budget-chart-spending-revenue-percent-of-gdp

 federal-government-spending-problem-680

where-did-your-tax-dollar-go-680budget-entitlement-programs-680 spending-cuts-680federal-spending-per-household-680 national-defense-spending-680 americas-deficit-federal-spending-680senate_budget_deficits social-security-benefit-payments-680

Sen Rand Paul on Baseline Budgeting

Ending Baseline Budgeting | House GOP Twitter Response

2014 U.S. Federal Budget: Taxes & Revenue

2014 U.S. Federal Budget: Budget Process

2014 U.S. Federal Budget: Social Insurance, Earned Benefits, & Entitlements

2014 U.S. Federal Budget: Debt and Deficit

US Congress has raised the debt ceiling 78 times since 1960

Baseline Budgeting

Rep. Louie Gohmert Applauds The Baseline Reform Act

Baseline Budgeting Explained

Underwhelming Spending Cuts from Congress and Obama

Understanding the National Debt and Budget Deficit

Part 1

fairtax

fair_tax_factst

FairTax: Fire Up Our Economic Engine (Official HD)

The FairTax: It’s Time

Flat Tax vs. National Sales Tax

Dan Mitchell Discussing Federal Tax Burden on CNBC

Eight Reasons Why Big Government Hurts Economic Growth

Dan Mitchell Explaining How Government Screws Up Everything

What is the FairTax legislation?

Cato Institute Senior Fellow Daniel J. Mitchell

How does the FairTax rate compare to today’s?

What assumptions does the FairTax make about government spending?

How does the FairTax rate compare to today’s?

Is the FairTax truly progressive?

How does the “prebate” work?

Will the prebate create a massive new entitlement system?

Wouldn’t it be more fair to exempt food and medicine from the FairTax?

Is it fair for rich people to get the same prebate as poor people?

If people bring home their whole paychecks how can prices fall?

How does the FairTax impact the middle class?

Why is the FairTax better than a flat income tax?

Is the FairTax rate really 23%?

Is consumption a reliable source of revenue?

How does the FairTax affect compliance costs?

Isn’t it a stretch to say the IRS will go away?

Can I pretend to be a business to avoid the sales tax?

How does the FairTax affect tax preparers and CPAs?

Are any significant economies funded by a sales tax?

How will the FairTax affect state sales tax systems?

Can’t Americans just cross the border to avoid the FairTax

How will Social Security payments be calculated under the FairTax?

Will the FairTax impact tax deferred retirement accounts like 401(k)s?

How will the FairTax® make the tax system fair for everyone?

What’s the difference between the FairTax® and the income tax?

How will the FairTax® help me save money?

Why Should Grandparents support FairTax®?

Congressman Woodall Discusses the FairTax

“The Case for the Fair Tax”

Freedom from the IRS! – FairTax Explained in Detail

John Stossel speaks to the Fair Tax Rally

Sen. Moran Discusses FairTax Legislation on U.S. Senate Floor

Mind blowing speech by Robert Welch in 1958

Robert Welch Speaks: In One Generation (1974)

comparison

GOP Taxonomy: The Flat Taxers and the Fair Taxers

by Aman Batheja

During his last run for president, Rick Perry often pulled a postcard out of his jacket pocket. “The best representation of my plan is this postcard, which taxpayers will be able to fill out to file their taxes,” Perry said. While Perry proposed an optional 20 percent flat tax on all income levels, the other Texan running that cycle, Ron Paul, wanted to get rid of the income tax altogether. The former Surfside congressman sometimes suggested replacing it and other federal taxes with a sales tax, a concept often described as the Fair Tax. As the 2016 landscape begins taking shape, potential Republican candidates are suggesting an interest in being both flat and fair, embracing some version of Perry’s 2012 proposal as the first step toward reaching Paul’s ideal. Take U.S. Sen. Ted Cruz, R-Texas, whose talk on taxes has sounded strikingly similar to Perry’s at times. “We should let taxes become so simple that they could be filled out on a postcard,” Cruz wrote in a column for USA Today in October. Yet while Cruz has called for converting the country’s progressive income tax system to a flat tax, his office confirmed that the Fair Tax is his long-term goal. “The senator supports a Fair Tax, ultimately,” spokeswoman Catherine Frazier said. “However, the most immediate, effective way to implement comprehensive tax reform is to pass a simple flat tax — so simple that Americans can file on a postcard. This should be the starting point for reform, and once it’s in place we should pursue a Fair Tax.” Another presidential contender, U.S. Sen. Rand Paul, R-Ky., has also voiced support for a flat tax, but still prefers the vision of his libertarian father, Ron Paul. “I’ve never said I don’t support a sales tax,” Rand Paul told The Texas Tribune recently while in Dallas. He explained that he viewed moving the federal tax system to a flat tax as “an easier concept to get through a legislature because you’re modifying the existing code.” More broadly, Rand Paul said he was interested in stimulating economic growth by reducing the federal taxes overall. “We’ve kind of lost that argument in recent years because many Republicans, including many in Washington, now simply argue for revenue neutral tax reform, which stimulates nothing,” Paul said. For former Arkansas Gov. Mike Huckabee, those talking about the flat tax as a bridge to the Fair Tax are missing the point. “Gov. Huckabee has said many times the Fair Tax is a flat tax, but it’s based on consumption rather than on punishing our productivity,” spokeswoman Alice Stewart said. Another potential presidential contender, former Florida Gov. Jeb Bush, delivered a speech on taxes and income inequality this week in Detroit that reportedly included support for simplifying the tax code, but did not include specific policy proposals. Critics of both flat tax and Fair Tax proposals dismiss them as regressive plans that would amount to tax cuts for higher-income households while increasing the tax burden on middle-class households. But conservatives argue that dramatically simplifying the tax code, or moving to a tax system focused more on consumption than earnings, would be more transparent, simpler and better for the economy in the long run. Cal Jillson, a political science professor at Southern Methodist University, said discussion of flat taxes and consumption taxes works well politically with Republican voters, but described them as “pie-in-the-sky, no-way-in-hell” proposals that won’t ever muster enough support in Congress. “When you talk about tax reform in an environment that is politically polarized as ours, it’s hard to see how you get majority support, let alone a bipartisan package that could be taken to the public by both parties,” Jillson said. “It’s a way of saying, ‘I have no sense of doing anything practical.’ ” While Cruz and Rand Paul have already signaled their positions, Perry, who has been meeting with dozens of policy experts to prepare for a second White House run, may end up tweaking his earlier flat tax plan. “He supports simplifying the tax code, lowering rates for working families, and closing loopholes,” spokeswoman Lucy Nashed said. “Gov. Perry is continuing to work on policy proposals and will announce specific ideas at the appropriate time.” http://www.texastribune.org/2015/02/08/flat-tax-fair-tax/

National Review: The FairTax Makes a Comeback

by: Ryan Lovelace

Republican senator David Perdue of Georgia sounds an awful lot like President Obama when he describes his plan to overhaul the tax code, which would repeal federal taxes and replace them with a consumption tax known as the “FairTax.” “[The FairTax] really levels the playing field in that regardless of who you are, where you are, you’ll pay your fair share, and it will be the same amount,” Perdue tells NRO. “It will be equitable.” Perdue couches his description of the FairTax in rhetorical terms — “levels the playing field,” “pay your fair share,” “equitable” — that could’ve come straight out of Obama’s State of the Union address, and that’s no accident. Whatever the political prospects of the proposal — it has failed over and over again when proposed in the past, and it is expected to meet a similar fate this time around — it could allow the GOP to seize the mantle of economic populism from the Democrats, and, in so doing, to “win” tax reform in the eyes of voters. That’s important, because tax-reform legislation is one of the few big, ostensibly bipartisan efforts the new Congress is expected to undertake, and the scramble to take credit for it ahead of the 2016 presidential election will be fierce. The FairTax legislation put forward in the Senate by Perdue, his fellow Georgia Republican Johnny Isakson, and their colleague Jerry Moran (R., Kan.), was written with 2016 in mind. Perdue says that on Tuesday, before listening to Obama announce his desire to raise taxes once again, he and Isakson discussed the importance of their work in influencing the debate on tax reform. Perdue — the successful manager known for his ability to turn around businesses and revive brands – says he hopes to help move 2016 GOP presidential candidates in the direction of the FairTax. The proposal itself is relatively simple: It would eliminate all federal income, payroll, gift, and estate taxes, and replace them with a 23 percent national sales tax. In addition to making the U.S. economy more competitive on a global scale and putting people back to work, the plan would strip the IRS of its ability to interfere in the lives of ordinary Americans, according to the conservative freshman from Georgia. Other longtime proponents of the idea agree, and argue that by replacing a system that taxes an individual’s earnings with one that exclusively taxes that same individual’s spending, it would allow each citizen the freedom to determine his own tax burden. Perdue’s hopes for 2016 notwithstanding, the FairTax has not been a winning issue in past Republican presidential primaries. A number of GOP primary candidates, from Mike Huckabee in 2008 to Herman Cain in 2012, have failed to win the nomination while championing the proposal. And it will still be a loser come 2016, says Ryan Ellis, the  tax-policy director at Grover Norquist’s Americans for Tax Reform. “If this thing [the FairTax] was going to catch on as the next great hot thing, it would have,” Ellis says. “It’s not a practical tax-reform plan for governing, it’s something that people wish, aspirationally, they could put out there.” The tax-reform proposals with the best chance of succeeding in Congress — and helping Republican candidates win in 2016 — are those that move incrementally toward the FairTax’s goals without overhauling the system in one fell swoop, Ellis says. Such proposals would likely combine some of the FairTax’s reforms — such as repealing the death tax and capital-gains taxes — with measures aimed at broadening the tax base of higher-income individuals. The winning formula to achieve fundamental tax reform, according to Ellis, is a plan that is pro-growth, pro-family, and “paid for by, as much as you can, rich guys.” But those who warn that the FairTax lacks political viability only give more motivation to Rob Woodall (R., Ga.), the lead sponsor of FairTax legislation in the House of Representatives. “That’s what I love about this bill: Washington hates this bill,” Woodall says. “There are all sorts of forces in town that discourage this kind of giant reform, but it’s being marketed at a grassroots level.” Woodall’s Georgia district has a history of electing FairTax proponents to Congress. Woodall’s seat was previously occupied by John Linder, a tireless champion who first introduced the FairTax bill in 1999, and reintroduced it in each new Congress until he retired in 2011. He never succeeded in changing the law, but he did quite a bit to build support in his home state. As Americans for Fair Taxation president Steve Hayes tells it, Atlanta-based radio talk-show host Neal Boortz is largely responsible for getting the idea off the ground. Boortz wrote The FairTax Book with Linder and trumpeted his support for the reform to a southeastern audience who readily took to the idea. Hayes’s organization works to garner more support for the idea across the United States. The “power base” of the FairTax proposal has moved out of the Southeast and into the Midwest, Woodall says. Moran’s support as a lead co-sponsor has helped the idea gain traction in Kansas. A top Moran aide who worked on the FairTax bill tells NRO that Moran began laying the groundwork to lead on this issue last year, as former Georgia senator Saxby Chambliss was preparing to retire. Chambliss was a staunch supporter of the FairTax, and the aide says the two offices worked behind the scenes to ensure that the push for tax reform would live on. Woodall thinks the geographical shift in support will help the idea flourish in California and the Northwest. Moreover, he wants to gather supporters in key 2016 Republican-primary states and grow grassroots support in order to influence the GOP’s agenda. But the effort to sell the FairTax primarily to devoted conservatives has left others in the dark as to its possible benefits. Laurence Kotlikoff, an economics professor at Boston University, has studied the FairTax and thinks it is a more progressive proposal than people realize. Kotlikoff says lawmakers’ lack of experience in public finance has led to a misunderstanding of the FairTax. He adds that he thinks Democratic minority leader Nancy Pelosi might even come around to the idea, if she realized that it would help some of the people she purports to care about most: workers. After years toiling under former Senate majority leader Harry Reid (D., Nev.), some conservatives have grown excited by the Senate’s movement on this issue. The Moran staffer thinks a total of 10 or 11 senators may ultimately support the proposal, including new members and others who have changed their minds. The number of original co-sponsors of the FairTax in the House has increased during each of the last three Congresses, peaking this year with 57 total supporters. Barring an unforeseen shift in Congress’s priorities, though, the FairTax appears doomed to fail yet again. Woodall knows the effort is ill-fated, and says he won’t look someone in the eye and tell them that a GOP-led Congress will put the FairTax on the president’s desk — or that the president would ever sign it. For the time being, his goal is more modest: He hopes to harness the relatively small but growing support for the proposal, and to take its message to voters across the country, showing his fellow Republicans that populist economic policies can win back the White House in 2016. “This is a mission to change the way people think about the tax code,” he says. “It’s kind of a crazy idea until you look at it and you say, ‘Golly, why haven’t we done that already?’ Because we know that we can’t win Washington until we win the American voter across the country.” – https://fairtax.org/articles/the-fairtax-makes-a-comeback

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 473-474

Listen To Pronk Pops Podcast or Download Show 464-472

Listen To Pronk Pops Podcast or Download Show 455-463

Listen To Pronk Pops Podcast or Download Show 447-454

Listen To Pronk Pops Podcast or Download Show 439-446

Listen To Pronk Pops Podcast or Download Show 431-438

Listen To Pronk Pops Podcast or Download Show 422-430

Listen To Pronk Pops Podcast or Download Show 414-421

Listen To Pronk Pops Podcast or Download Show 408-413

Listen To Pronk Pops Podcast or Download Show 400-407

Listen To Pronk Pops Podcast or Download Show 391-399

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 470, May 22, 2015, Story 1: Part 1 of 3: American People Leaving Both Democratic and Republican Parties In Search of A Party With Principles and Leaders With Integrity and Defenders of The United States Constitution — A New Direction For America — Videos

Posted on May 22, 2015. Filed under: American History, Banking System, Blogroll, Breaking News, Budgetary Policy, Business, College, Communications, Computers, Congress, Constitutional Law, Corruption, Crime, Culture, Economics, Education, Empires, Employment, European History, Federal Government, Fiscal Policy, Foreign Policy, Genocide, Government, Government Dependency, Government Spending, Health Care, Health Care Insurance, History, Housing, Illegal Immigration, Immigration, Insurance, Investments, Labor Economics, Law, Legal Immigration, Media, Middle East, Monetary Policy, Philosophy, Photos, Politics, Polls, President Barack Obama, Pro Life, Radio, Raymond Thomas Pronk, Scandals, Socials Security, Tax Policy, Taxation, Taxes, Unemployment, United States Constitution, Videos, Violence, War, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 470 May 22, 2015

Pronk Pops Show 469 May 21, 2015

Pronk Pops Show 468 May 20, 2015 

Pronk Pops Show 467 May 19, 2015

Pronk Pops Show 466 May 18, 2015

Pronk Pops Show 465 May 15, 2015

Pronk Pops Show 464 May 14, 2015

Pronk Pops Show 463 May 13, 2015

Pronk Pops Show 462 May 8, 2015

Pronk Pops Show 461 May 7, 2015

Pronk Pops Show 460 May 6, 2015

Pronk Pops Show 459 May 4, 2015 

Pronk Pops Show 458 May 1, 2015 

Pronk Pops Show 457 April 30, 2015 

Pronk Pops Show 456: April 29, 2015 

Pronk Pops Show 455: April 28, 2015

Pronk Pops Show 454: April 27, 2015

Pronk Pops Show 453: April 24, 2015

Pronk Pops Show 452: April 23, 2015 

Pronk Pops Show 451: April 22, 2015

Pronk Pops Show 450: April 21, 2015

Pronk Pops Show 449: April 20, 2015

Pronk Pops Show 448: April 17, 2015

Pronk Pops Show 447: April 16, 2015

Pronk Pops Show 446: April 15, 2015

Pronk Pops Show 445: April 14, 2015

Pronk Pops Show 444: April 13, 2015

Pronk Pops Show 443: April 9, 2015

Pronk Pops Show 442: April 8, 2015

Pronk Pops Show 441: April 6, 2015

Pronk Pops Show 440: April 2, 2015

Pronk Pops Show 439: April 1, 2015

Pronk Pops Show 438: March 31, 2015

Pronk Pops Show 437: March 30, 2015 

Pronk Pops Show 436: March 27, 2015 

Pronk Pops Show 435: March 26, 2015

Pronk Pops Show 434: March 25, 2015

Pronk Pops Show 433: March 24, 2015

Pronk Pops Show 432: March 23, 2015

Pronk Pops Show 431: March 20, 2015

Pronk Pops Show 430: March 19, 2015

Pronk Pops Show 429: March 18, 2015

Pronk Pops Show 428: March 17, 2015 

Pronk Pops Show 427: March 16, 2015

Pronk Pops Show 426: March 6, 2015

Pronk Pops Show 425: March 4, 2015

Pronk Pops Show 424: March 2, 2015

Pronk Pops Show 423: February 26, 2015

Pronk Pops Show 422: February 25, 2015 

Pronk Pops Show 421: February 20, 2015

Pronk Pops Show 420: February 19, 2015

Pronk Pops Show 419: February 18, 2015

Pronk Pops Show 418: February 16, 2015

Pronk Pops Show 417: February 13, 2015

Pronk Pops Show 416: February 12, 2015

Pronk Pops Show 415: February 11, 2015

Pronk Pops Show 414: February 10, 2015

Pronk Pops Show 413: February 9, 2015

Pronk Pops Show 412: February 6, 2015

Pronk Pops Show 411: February 5, 2015

Pronk Pops Show 410: February 4, 2015

Pronk Pops Show 409: February 3, 2015

Pronk Pops Show 408: February 2, 2015

Story 1: Part 1 of 3: American People Leaving Both Democratic and Republican Parties In Search of A Party With Principles and Leaders With Integrity and Defenders of The United States Constitution — A New Direction For America — Videos

Five Finger Death Punch – Wrong Side Of Heaven

[

Gallup: Partisan split at historic level

Gallup Poll: Americans Overwhelmingly Want GOP Congress to Set Country’s Agenda, Not Obama

Most Political Independents Ever In USA

How Are Conservative And Liberal Brains Different?

Poll Record High 42 Percent Americans Identify As Independents

Against the USA, Naked Communist Conspiracy Is Unfolding, NWO

1.U.S. acceptance of coexistence as the only alternative to atomic war.
2.U.S. willingness to capitulate in preference to engaging in atomic war.
3.Develop the illusion that total disarmament by the United States would be a demonstration of moral strength.
4.Permit free trade between all nations regardless of Communist affiliation
5.Extension of long-term loans to Russia & satellites.
6.Provide American aid to all nations regardless
7.Grant recognition of Red China. Admission of Red China to the U.N.
8.Set up East and West Germany as separate states under supervision of the U.N.
9.Prolong the conferences to ban atomic tests because the U.S. has agreed to suspend tests as long as negotiations are in progress.
10.Allow all Soviet satellites individual representation in the U.N.
11.Promote the U.N. as the only hope for mankind. Demand that it be set up as a one-world government with its own independent armed forces.
12.Resist any attempt to outlaw the Communist Party.
13.Do away with all loyalty oaths.
14.Continue giving Russia access to the U.S. Patent Office.
15.Capture one or both of the political parties.
16.Use technical decisions of the courts to weaken by claiming their activities violate civil rights.
17.Get control of the schools. Promote Communist propaganda. Soften the curriculum. Get control of teachers’ associations.
18.Gain control of all student newspapers.
19.Use student riots to foment public protests against programs or organizations which are under Communist attack.
20.Infiltrate the press. Get control of book-review assignments, editorial writing, policymaking positions.
21.Gain control of key positions in radio, TV, and motion pictures.
22.Continue discrediting American culture by degrading all forms of artistic expression. “eliminate all good sculpture from parks and buildings, substitute shapeless, awkward and meaningless forms.”
23.Control art critics and directors of art museums.
24.Eliminate all laws governing obscenity by calling them “censorship” and a violation of free speech.
25.Break down cultural standards of morality by promoting pornography and obscenity 26.Present homosexuality, degeneracy and promiscuity as “normal, natural, healthy.”
27.Infiltrate the churches and replace revealed religion with “social” religion. Discredit the Bible as a “religious crutch.”
28.Eliminate prayer or religious expression in the schools
29.Discredit the American Constitution by calling it inadequate, old-fashioned, a hindrance to cooperation between nations on a worldwide basis.
30.Discredit the American Founding Fathers.
31.Belittle all forms of American culture and discourage the teaching of American history
32.Support any socialist movement to give centralized control over any part of the culture; education, social agencies, welfare programs, mental health clinics, etc.
33.Eliminate all laws or procedures which interfere with the operation of communism
34.Eliminate the House Committee on Un-American Activities.
35.Discredit and eventually dismantle the FBI.
36.Infiltrate and gain control of more unions.
37.Infiltrate and gain control of big business.
38.Transfer some of the powers of arrest from the police to social agencies. Treat all behavioral problems as psychiatric disorders which no one but psychiatrists can understand or treat.
39.Dominate the psychiatric profession and use mental health laws as a means of gaining coercive control over those who oppose Communist goals.
40.Discredit the family. Encourage promiscuity, masturbation, easy divorce.
41.Emphasize the need to raise children away from the negative influence of parents. Attribute prejudices, mental blocks and retarding to suppressive influence of parents.
42.Create the impression that violence and insurrection are legitimate aspects of the American tradition; that students and special-interest groups should rise up and use “united force” to solve economic, political or social problems.
43.Overthrow all colonial governments before natives are ready for self-government.
44.Internationalize the Panama Canal.
45.Repeal the Connally reservation so the United States cannot prevent the World Court from seizing jurisdiction over domestic problems and individuals alike.

Mind Control, Psychology of Brainwashing, Sex & Hypnosis

Fit vs. UnFit, Eugenics, Planned Parenthood & Psychology, Mind Control Report

Yuri Bezmenov: Psychological Warfare Subversion & Control of Western Society

The Subversion Factor, Part 1: Moles In High Places

The Subversion Factor, Part 2: The Open Gates of Troy

G. Edward Griffin – The Collectivist Conspiracy

youtube=https://www.youtube.com/watch?v=jAdu0N1-tvU]

The Quigley Formula – G. Edward Griffin lecture

Robert Welch in 1974 reveals NWO

Robert Welch Speaks: A Touch of Sanity (1965)

Robert Welch Speaks: In One Generation (1974)

CORPORATE FASCISM: The Destruction of America’s Middle Class

CULTURAL MARXISM: The Corruption of America

Countdown to Financial Collapse – A Conversation with G. Edward Griffin

WRCFresnoTV — G. Edward Griffin — The Federal Reserve, Taxes, The I.R.S. & Solutions

Rammstein “We’re all living in America” (HD) English Subtitle

Series Id:           LNS14000000
Seasonally Adjusted
Series title:        (Seas) Unemployment Rate
Labor force status:  Unemployment rate
Type of data:        Percent or rate
Age:                 16 years and over

Series Id:           LNS13327709
Seasonally Adjusted
Series title:        (seas) Total unemployed, plus all marginally attached workers plus total employed part time for economic reasons, as a percent of all civilian labor force plus all marginally attached workers
Labor force status:  Aggregated totals unemployed
Type of data:        Percent or rate
Age:                 16 years and over
Percent/rates:       Unemployed and mrg attached and pt for econ reas as percent of labor force plus marg attached

Series Id:           LNS11300000
Seasonally Adjusted
Series title:        (Seas) Labor Force Participation Rate
Labor force status:  Civilian labor force participation rate
Type of data:        Percent or rate
Age:                 16 years and over

Series Id:           LNS12000000
Seasonally Adjusted
Series title:        (Seas) Employment Level
Labor force status:  Employed
Type of data:        Number in thousands
Age:                 16 years and over

Series Id:           LNS13000000
Seasonally Adjusted
Series title:        (Seas) Unemployment Level
Labor force status:  Unemployed
Type of data:        Number in thousands
Age:                 16 years and over

Series Id:           LNS15000000
Seasonally Adjusted
Series title:        (Seas) Not in Labor Force
Labor force status:  Not in labor force
Type of data:        Number in thousands
Age:                 16 years and over

WASHINGTON, D.C. — After reaching a more than two-year high in early 2015, Americans’ satisfaction with the direction of the U.S. continues to fall. Twenty-six percent of Americans say they are satisfied with the way things are going in the nation in May, down slightly from 32% in January and February.

Satisfaction With the Direction of the U.S.

The latest data are from Gallup’s May 6-10 poll.

Satisfaction jumped nine points in January to 32%, a promising sign that Americans’ moods were improving after a year of lower figures throughout 2014, ranging between 20% and 27%. Since February, though, satisfaction has dipped only slightly each month, but these small drops have resulted in a six-point decline since the beginning of the year. Satisfaction remains below the 36% historical average for Gallup’s trend dating back to 1979.

The drop in Americans’ satisfaction with the way things are going parallels the recent decline in economic confidence. Americans had a more positive outlook on the economy at the dawn of 2015, but these views, like satisfaction, have edged down in recent months.

Satisfaction With the Direction of the U.S. vs. Economic Confidence

Views of the nation’s direction have certainly been brighter in the past. Majorities of Americans were typically satisfied with the direction of the U.S. between 1998 and mid-2002 — including a record high of 71% in February 1999. But satisfaction declined steadily in the latter half of President George W. Bush’s presidency as the public grew disillusioned with the war in Iraq and the national economy suffered. This dip in satisfaction culminated in 7% of Americans, a record low, saying they were satisfied with the direction of the nation in October 2008 as the global economy collapsed and the U.S. stock market plummeted.

Satisfaction improved significantly during the first year of President Barack Obama’s term — reaching 36% in August 2009. It has not returned to that level since, ranging between 11% and 33% throughout Obama’s time in office.

Americans Still List Economy, Gov’t and Unemployment as Top Problems

Though the 14% of Americans who name dissatisfaction with government, Congress and politicians as the top problem facing the U.S. has fallen five points since April, it still remains the most commonly mentioned problem — a distinction it has held for six months.

The economy in general (12%) and unemployment (10%) have remained at the top of the list for several years. But mentions of these issues are down significantly from their recent peaks — the economy reached a high of 37% in 2012, and unemployment reached a high of 39% in 2011.

Trends in Top

Race relations and racism (8%), immigration (6%), a decline in moral, religious and family ethics (6%), the state of the healthcare system (5%) and terrorism (5%) were also among the most frequently cited problems facing the nation.

Most Commonly Named Problems in April 2015 vs. May 2015

Bottom Line

After years of dysfunctional government, the economy and unemployment dominating Americans’ mentions of the top problem facing the nation, fewer mention these problems now than in recent years. Still, these three problems remain at the forefront of Americans’ concerns, and may be driving Americans’ high level of dissatisfaction with the nation’s direction.

Although Americans’ confidence in the economy is higher this year than in recent years, it is still negative. And while fewer mention dysfunctional government as the nation’s top problem, Americans still strongly disapprove of Congress’ performance and remain divided on Obama’s.

Meanwhile, mentions of unemployment as a top problem have dipped as more U.S. workers report their workplaces are hiring and the unemployment rate as reported by the BLS declines. But unemployment still remains one of the most frequently cited problems.

Survey Methods

Results for this Gallup poll are based on telephone interviews conducted May 6-10, 2015, with a random sample of 1,024 adults, aged 18 and older, living in all 50 U.S. states and the District of Columbia. For results based on the total sample of national adults, the margin of sampling error is ±4 percentage points at the 95% confidence level. All reported margins of sampling error include computed design effects for weighting.

Each sample of national adults includes a minimum quota of 50% cellphone respondents and 50% landline respondents, with additional minimum quotas by time zone within region. Landline and cellular telephone numbers are selected using random-digit-dial methods.

http://www.gallup.com/poll/183248/americans-satisfaction-direction-wanes.aspx?utm_source=Politics&utm_medium=newsfeed&utm_campaign=tiles

Trend: Party affiliation in U.S. plus leaners

Story Highlights

  • Congressional job approval at 19%, essentially unchanged
  • Approval of GOP Congress similar among Republicans and Democrats

WASHINGTON, D.C. — Congressional job approval, currently at 19%, remains stuck near historical lows, despite a number of recent high-profile legislative achievements.

Congressional Job Approval Ratings: 2001-2015

Over the past month, Congress has confirmed the stalled nomination of Attorney General Loretta Lynch and both chambers passed a bill that was signed into law regarding Medicare. Bills that would authorize limited congressional oversight on any international agreement with Iran and help victims of human trafficking passed the Senate with little or no opposition. The uptick in activity, though hardly historic, is notable compared with the past two Congresses. Those Congresses, marked by divided control of the two chambers, were known for their entrenched partisan gridlock and few legislative accomplishments. And Americans didn’t care for their inability to agree — they gave Congress its lowest approval ever over this time period. Gallup found in June 2013, six months into the previous Congress, that gridlock and ineffectiveness were the most frequently cited reason for Americans’ disapproval of Congress.

Several months into this new Congress, the accomplishments that have been realized could give one the impression that the gridlock is softening, particularly over the past month. But these achievements have had virtually no impact on Congress’s job approval compared with early April (15%).

And, of course, Congress is far from working perfectly now, even if the pace of work appears to have increased. Most dramatically, the Senate failed to overcome a Democratic filibuster Tuesday afternoon that would give the president enhanced authority in negotiating trade bills, though the May survey was conducted before this occurrence. Legislation authorizing the use of military force in Iraq and Syria to fight ISIS, proposed by the administration and which many members of Congress support, remains stalled.

GOP Congress Has Low Approval Among Republicans

A key reason the current 114th Congress appears to be having more legislative success than the two Congresses before it is that the House and Senate are now under one party’s control. Unified GOP control of Capitol Hill should, at least in theory, boost Republicans’ overall approval of Congress. But the expected “Republican rally” for Congress has yet to materialize — 21% of Republicans and Republican leaners approve of Congress, not much different from the 18% of independents and of Democrats who approve. Nor is Republican support notably higher than the 15% it reached in 2014, despite the decided Republican tilt of this year’s legislature.

Congressional Job Approval, by Party Identification, May 2015

Bottom Line

After years of dysfunction, Congress is moving forward on key pieces of legislation. No longer shackled by split control — though still facing a president of the opposite party — the legislative branch is suddenly finding some areas of agreement. But even if it appears that the gridlock is easing, the overwhelming majority of Americans still disapprove of Congress. If Congress continues passing bipartisan legislation, more Americans might soften their stance. Still, it may be that Americans are largely not aware of or impressed by Congress’ recent legislative successes. Or it may be that the hit to Congress’ reputation over the last several years — evident not only in dismal job approval ratings, but also fallinglevels of trust and confidence — will take a long time to reverse.

Survey Methods

Results for this Gallup poll are based on telephone interviews conducted May 6-10, 2015, with a random sample of 1,024 adults, aged 18 and older, living in all 50 U.S. states and the District of Columbia. For results based on the total sample of national adults, the margin of sampling error is ±4 percentage points at the 95% confidence level. All reported margins of sampling error include computed design effects for weighting.

Each sample of national adults includes a minimum quota of 50% cellphone respondents and 50% landline respondents, with additional minimum quotas by time zone within region. Landline and cellular telephone numbers are selected using random-digit-dial methods.

http://www.gallup.com/poll/183128/five-months-gop-congress-approval-remains-low.aspx?utm_source=Politics&utm_medium=newsfeed&utm_campaign=tiles

Story Highlights

  • 31% say they are socially liberal, 31% socially conservative
  • This is the first time conservatives have not outnumbered liberals
  • Conservatives maintain edge on economic issues

PRINCETON, N.J. — Thirty-one percent of Americans describe their views on social issues as generally liberal, matching the percentage who identify as social conservatives for the first time in Gallup records dating back to 1999.

Trend: Americans' Self-Description of Views on Social Issues

Gallup first asked Americans to describe their views on social issues in 1999, and has repeated the question at least annually since 2001. The broad trend has been toward a shrinking conservative advantage, although that was temporarily interrupted during the first two years of Barack Obama’s presidency. Since then, the conservative advantage continued to diminish until it was wiped out this year.

The newfound parity on social ideology is a result of changes in the way both Democrats and Republicans describe their social views. The May 6-10 Gallup poll finds a new high of 53% of Democrats, including Democratic-leaning independents, describing their views on social issues as liberal.

Trend: Ideological Identification on Social Issues, Democrats and Democratic Leaners, 2001-2015

Democrats were more likely to describe their views on social issues as moderate rather than liberal from 2001 to 2005. Since then, socially liberal Democrats have outnumbered socially moderate Democrats in all but one year.

Meanwhile, the 53% of Republicans and Republican leaners saying their views on social issues are conservative is the lowest in Gallup’s trend. The drop in Republicans’ self-identified social conservatism has been accompanied by an increase in moderate identification, to 34%, while the percentage identifying as socially liberal has been static near 10%.

Trend: Ideological Identification on Social Issues, Republicans and Republican Leaners, 2001-2015

These trends echo the pattern in Gallup’s overall ideology measure, which dates back to 1992 and shows increasing liberal identification in recent years. As with the social ideology measure, the longer-term shifts are mainly a result of increasing numbers of Democrats describing their views as liberal rather than moderate. That may reflect Democrats feeling more comfortable in describing themselves as liberal than they were in the past, as much as a more leftward shift in Democrats’ attitudes on political, economic and social issues.

Conservatives Still Lead Liberals on Economic Issues

In contrast to the way Americans describe their views on social issues, they still by a wide margin, 39% to 19%, describe their views on economic issues as conservative rather than liberal. However, as on social ideology, the gap between conservatives and liberals has been shrinking and is lower today than at any point since 1999, with the 39% saying they are economically conservative the lowest to date.

Trend: Americans' Self-Description of Views on Economic Issues

Currently, 64% of Republicans identify as conservative economically, which is down from 70% the previous two years and roughly 75% in the early years of the Obama presidency. During George W. Bush’s administration, Republicans were less likely to say they were economic conservatives, with as few as 58% doing so in 2004 and 2005. The trends suggest Republicans’ willingness to identify as economic conservatives, or economic moderates, is influenced by the party of the president in office, and perhaps the types of financial policies the presidential administration is pursuing at the time.

Trend: Ideological Identification on Economic Issues, Republicans and Republican Leaners, 2001-2015

Democrats are also contributing to the trend in lower economic conservative identification. While the plurality of Democrats have consistently said they are economically moderate, Democrats have been more likely to identify as economic liberals than as economic conservatives since 2007. The last two years, there has been a 15-percentage-point gap in liberal versus conservative identification among Democrats on economic matters.

Trend: Ideological Identification on Economic Issues, Democrats and Democratic Leaners, 2001-2015

Implications

Americans’ growing social liberalism is evident not only in how they describe their views on social issues but also in changes in specific attitudes, such as increased support for same-sex marriage and legalizing marijuana. These longer-term trends may be attributable to changing attitudes among Americans of all ages, but they also may be a result of population changes, with younger, more liberal Americans entering adulthood while older, more conservative adults pass on. Gallup found evidence that population replacement is a factor in explaining changes in overall ideology using an analysis of birth cohorts over time.

The 2016 presidential election will thus be contested in a more socially liberal electorate — and a less economically conservative one — than was true of prior elections. Economically and socially conservative candidates may still appeal to the Republican Party base in the primaries, but it may be more important now than in the past for the GOP nominee to be a bit less conservative on social issues in order to appeal to the broader general electorate.

And while Americans are less economically conservative than in the past, economic conservatives still outnumber economic liberals by about 2-to-1. As a result, Democrats must be careful not to nominate a candidate who is viewed as too liberal on economic matters if their party hopes to hold the White House beyond 2016.

Survey Methods

Results for this Gallup poll are based on telephone interviews conducted May 6-10, 2015, with a random sample of 1,024 adults, aged 18 and older, living in all 50 U.S. states and the District of Columbia. For results based on the total sample of national adults, the margin of sampling error is ±4 percentage points at the 95% confidence level. All reported margins of sampling error include computed design effects for weighting.

Each sample of national adults includes a minimum quota of 50% cellphone respondents and 50% landline respondents, with additional minimum quotas by time zone within region. Landline and cellular telephone numbers are selected using random-digit-dial methods.

http://www.gallup.com/poll/183386/social-ideology-left-catches-right.aspx?utm_source=Politics&utm_medium=newsfeed&utm_campaign=tiles

AGAINST THE GRAIN
Democrats’ Vanishing Future

Hillary Clinton is not the only Democratic comeback candidate on the 2016 ticket. Senate Democrats are betting on the past to rebuild their party for the future.

BY JOSH KRAUSHAAR

One of the most underappreciated stories in recent years is the deterioration of the Democratic bench under President Obama’s tenure in office. The party has become much more ideologically homogenous, losing most of its moderate wing as a result of the last two disastrous midterm elections. By one new catch-all measure, a party-strength index introduced by RealClearPolitics analysts Sean Trende and David Byler, Democrats are in their worst position since 1928. That dynamic has manifested itself in the Democratic presidential contest, where the bench is so barren that a flawed Hillary Clinton is barreling to an uncontested nomination.

But less attention has been paid to how the shrinking number of Democratic officeholders in the House and in statewide offices is affecting the party’s Senate races. It’s awfully unusual to see how dependent Democrats are in relying on former losing candidates as their standard-bearers in 2016. Wisconsin’s Russ Feingold, Pennsylvania’s Joe Sestak, Indiana’s Baron Hill, and Ohio’s Ted Strickland all ran underwhelming campaigns in losing office in 2010—and are looking to return to politics six years later. Party officials are courting former Sen. Kay Hagan of North Carolina to make a comeback bid, despite mediocre favorability ratings and the fact that she lost a race just months ago that most had expected her to win. All told, more than half of the Democrats’ Senate challengers in 2016 are comeback candidates.

On one hand, most of these candidates are the best choices Democrats have. Feingold and Strickland are running ahead of GOP Sens. Ron Johnson and Rob Portman in recent polls. Hill and Hagan boast proven crossover appeal in GOP-leaning states that would be challenging pickups. Their presence in the race gives the party a fighting chance to retake the Senate.

(RELATED: What’s Next In the House Benghazi Committee’s Hillary Clinton Investigation)

But look more closely, and the reliance on former failures is a direct result of the party having no one else to turn to. If the brand-name challengers didn’t run, the roster of up-and-coming prospects in the respective states is short. They’re also facing an ominous historical reality that only two defeated senators have successfully returned to the upper chamber in the last six decades. As political analyst Stu Rothenberg put it, they’re asking “voters to rehire them for a job from which they were fired.” Senate Democrats are relying on these repeat candidates for the exact same reason that Democrats are comfortable with anointing Hillary Clinton for their presidential nomination: There aren’t any better alternatives.

ADVERTISEMENT

For a portrait of the Democrats’ slim pickings, just look at the political breakdown in three of the most consequential battleground states. Republicans hold 12 of Ohio’s 16 House seats, and all six of their statewide offices. In Wisconsin, Republicans hold a majority of the state’s eight House seats and four of five statewide partisan offices. In Pennsylvania, 13 of the 18 representatives are Republicans, though Democrats hold all the statewide offices. (One major caveat: Kathleen Kane, the Democrats’ once-hyped attorney general in the state, is under criminal investigation and has become a political punchline.) These are all Democratic-friendly states that Obama carried twice.

If Strickland didn’t run, the party’s hopes against Portman would lie in the hands of 30-year-old Cincinnati Councilman P.G. Sittenfeld, who would make unexpected history as one of the nation’s youngest senators with a victory. (Sittenfeld is still mounting a long-shot primary campaign against Strickland.) Without Feingold in Wisconsin, the party’s only logical option would be Rep. Ron Kind, who has regularly passed up opportunities for a promotion. Former Milwaukee Mayor Tom Barrett already lost to Gov. Scott Walker twice, and businesswoman Mary Burke disappointed as a first-time gubernatorial candidate last year. And despite the Democratic establishment’s publicized carping over Joe Sestak in Pennsylvania, the list of alternatives is equally underwhelming: His only current intra-party opposition is from the mayor of Allentown.

(RELATED: Hillary Clinton to Launch Her Campaign, Again)

In the more conservative states, the drop-off between favored recruits and alternatives is even more stark. Hagan would be a flawed nominee in North Carolina, but there’s no one else waiting in the wings. The strongest Democratic politician, Attorney General Roy Cooper, is running for governor instead. And in Indiana, the bench is so thin that even the GOP’s embattled governor, Mike Pence, isn’t facing formidable opposition. Hill, who lost congressional reelection campaigns in both 2004 and 2010, is not expected to face serious primary competition in the race to succeed retiring GOP Sen. Dan Coats.

Even in the two swing states where the party landed young, up-and-coming recruits to run, their options were awfully limited. In Florida, 32-year-old Rep. Patrick Murphy is one of only five House Democrats to represent a district that Mitt Romney carried in 2012—and his centrism has made him one of the most compelling candidates for higher office. The Democratic Senatorial Campaign Committee quickly rallied behind his campaign (in part to squelch potential opposition from firebrand congressman Alan Grayson). But if Murphy didn’t run, the alternatives would have been limited: freshman Rep. Gwen Graham and polarizing Democratic National Committee Chair Debbie Wasserman Schultz being the most logical alternatives.

In Nevada, Democrats boast one of their strongest challengers in former state Attorney General Catherine Cortez Masto, vying to become the first Latina ever elected to the Senate. But her ascension is due, in part, to the fact that other talented officeholders lost in the 2014 statewide wipeout. Democratic lieutenant-governor nominee Lucy Flores, hyped by MSNBC as a “potential superstar,” lost by 26 points to her GOP opponent. Former Secretary of State Ross Miller, another fast-rising pol, badly lost his bid for attorney general against a nondescript Republican. By simply taking a break from politics, Cortez Masto avoided the wave and kept her prospects alive for 2016.

(RELATED: Newly Released Clinton Email Detail Benghazi Correspondence)

DON’T MISS TODAY’S TOP STORIES
“Concise coverage of everything I wish I had hours to read about.”Chuck, Graduate StudentSign up form for the newsletter

This isn’t an assessment of Democratic chances for a Senate majority in 2017; it’s a glaring warning for the party’s longer-term health. If Clinton can’t extend the Democrats’ presidential winning streak—a fundamental challenge, regardless of the political environment—the party’s barren bench will cause even more alarm for the next presidential campaign. And if the Democrats’ core constituencies don’t show up for midterm elections—an outlook that’s rapidly becoming conventional wisdom—Democrats have serious challenges in 2018 as well. It’s why The New Yorker’s liberal writer John Cassidy warned that a Clinton loss next year could “assign [Republicans] a position of dominance.”

By focusing on how the electorate’s rapid change would hand Democrats a clear advantage in presidential races, Obama’s advisers overlooked how the base-stroking moves would play in the states. Their optimistic view of the future has been adopted by Clinton, who has been running to the left even without serious primary competition.

But without a future generation of leaders able to compellingly carry the liberal message, there’s little guarantee that changing demographics will secure the party’s destiny. The irony of the 2016 Senate races is that Democrats are betting on the past, running veteran politicians to win them back the majority—with Clinton at the top of the ticket. If that formula doesn’t work, the rebuilding process will be long and arduous.

http://www.nationaljournal.com/against-the-grain/democrats-vanishing-future-20150521

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 464-470

Listen To Pronk Pops Podcast or Download Show 455-463

Listen To Pronk Pops Podcast or Download Show 447-454

Listen To Pronk Pops Podcast or Download Show 439-446

Listen To Pronk Pops Podcast or Download Show 431-438

Listen To Pronk Pops Podcast or Download Show 422-430

Listen To Pronk Pops Podcast or Download Show 414-421

Listen To Pronk Pops Podcast or Download Show 408-413

Listen To Pronk Pops Podcast or Download Show 400-407

Listen To Pronk Pops Podcast or Download Show 391-399

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 154, October 23, 2013, Segment 0: U-3 Headline Unemployment Rate Above 7% For 56 Months of Obama Administration — Videos

Posted on October 23, 2013. Filed under: American History, Budgetary Policy, Business, Communications, Consitutional Law, Economics, Education, Employment, Fiscal Policy, Government, Government Dependency, Government Spending, Health Care Insurance, History, Housing, Illegal Immigration, Immigration, Investments, Labor Economics, Law, Media, Monetary Policy, Networking, Philosophy, Photos, Politics, Polls, Pro Life, Public Sector Unions, Resources, Security, Socials Security, Success, Tax Policy, Taxes, Unemployment, Unions, Videos, Violence, Wealth, Wisdom | Tags: , , , , , , , , , , , , , |

Project_1

Pronk Pops Show 154: October 23, 2013

Pronk Pops Show 153: October 21, 2013

Pronk Pops Show 152: October 18, 2013

Pronk Pops Show 151: October 17, 2013

Pronk Pops Show 150: October 16, 2013

Pronk Pops Show 149: October 14, 2013

Pronk Pops Show 148: October 11, 2013

Pronk Pops Show 147: October 10, 2013

Pronk Pops Show 146: October 9, 2013

Pronk Pops Show 145: October 8, 2013

Pronk Pops Show 144: October 7, 2013

Pronk Pops Show 143: October 4 2013

Pronk Pops Show 142: October 3, 2013

Pronk Pops Show 141: October 2, 2013

Pronk Pops Show 140: September 30, 2013

Pronk Pops Show 139: September 27, 2013

Pronk Pops Show 138: September 26, 2013

Pronk Pops Show 137: September 25, 2013

Pronk Pops Show 136: September 24, 2013

Pronk Pops Show 135: September 23, 2013

Pronk Pops Show 134: September 20, 2013

Pronk Pops Show 133: September 19, 2013

Pronk Pops Show 132: September 18, 2013

Pronk Pops Show 131: September 17, 2013

Pronk Pops Show 130: September 16, 2013

Pronk Pops Show 129: September 13, 2013

Pronk Pops Show 128: September 12, 2013

Pronk Pops Show 127: September 11, 2013

Pronk Pops Show 126: September 10, 2013

Pronk Pops Show 125: September 9, 2013

Pronk Pops Show 124: September 6, 2013

Listen To Pronk Pops Podcast or Download Show 151-154

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142